| diff -Naur JavaViewer.orig/ButtonPanel.java JavaViewer/ButtonPanel.java |
| --- JavaViewer.orig/ButtonPanel.java 2004-12-12 20:51:02.000000000 -0500 |
| +++ JavaViewer/ButtonPanel.java 2007-05-31 15:40:45.000000000 -0400 |
| @@ -43,30 +43,36 @@ |
| viewer = v; |
| |
| setLayout(new FlowLayout(FlowLayout.LEFT, 0, 0)); |
| - disconnectButton = new Button("Disconnect"); |
| + if (v.ftpOnly) { |
| + disconnectButton = new Button("Quit"); |
| + } else { |
| + disconnectButton = new Button("Close"); |
| + } |
| disconnectButton.setEnabled(false); |
| add(disconnectButton); |
| disconnectButton.addActionListener(this); |
| - optionsButton = new Button("Options"); |
| - add(optionsButton); |
| - optionsButton.addActionListener(this); |
| - clipboardButton = new Button("Clipboard"); |
| - clipboardButton.setEnabled(false); |
| - add(clipboardButton); |
| - clipboardButton.addActionListener(this); |
| - if (viewer.rec != null) { |
| - recordButton = new Button("Record"); |
| - add(recordButton); |
| - recordButton.addActionListener(this); |
| - } |
| - ctrlAltDelButton = new Button("Send Ctrl-Alt-Del"); |
| - ctrlAltDelButton.setEnabled(false); |
| - add(ctrlAltDelButton); |
| - ctrlAltDelButton.addActionListener(this); |
| - refreshButton = new Button("Refresh"); |
| - refreshButton.setEnabled(false); |
| - add(refreshButton); |
| - refreshButton.addActionListener(this); |
| + if (!v.ftpOnly) { |
| + optionsButton = new Button("Options"); |
| + add(optionsButton); |
| + optionsButton.addActionListener(this); |
| + clipboardButton = new Button("Clipboard"); |
| + clipboardButton.setEnabled(false); |
| + add(clipboardButton); |
| + clipboardButton.addActionListener(this); |
| + if (viewer.rec != null) { |
| + recordButton = new Button("Record"); |
| + add(recordButton); |
| + recordButton.addActionListener(this); |
| + } |
| + ctrlAltDelButton = new Button("Send Ctrl-Alt-Del"); |
| + ctrlAltDelButton.setEnabled(false); |
| + add(ctrlAltDelButton); |
| + ctrlAltDelButton.addActionListener(this); |
| + refreshButton = new Button("Refresh"); |
| + refreshButton.setEnabled(false); |
| + add(refreshButton); |
| + refreshButton.addActionListener(this); |
| + } |
| ftpButton = new Button("File Transfer"); |
| ftpButton.setEnabled(false); |
| add(ftpButton); |
| @@ -79,9 +85,10 @@ |
| |
| public void enableButtons() { |
| disconnectButton.setEnabled(true); |
| + ftpButton.setEnabled(true); |
| + if (viewer.ftpOnly) {return;} |
| clipboardButton.setEnabled(true); |
| refreshButton.setEnabled(true); |
| - ftpButton.setEnabled(true); |
| } |
| |
| // |
| @@ -89,6 +96,9 @@ |
| // |
| |
| public void disableButtonsOnDisconnect() { |
| + ftpButton.setEnabled(false); |
| + if (viewer.ftpOnly) {return;} |
| + |
| remove(disconnectButton); |
| disconnectButton = new Button("Hide desktop"); |
| disconnectButton.setEnabled(true); |
| @@ -99,7 +109,6 @@ |
| clipboardButton.setEnabled(false); |
| ctrlAltDelButton.setEnabled(false); |
| refreshButton.setEnabled(false); |
| - ftpButton.setEnabled(false); |
| |
| validate(); |
| } |
| @@ -110,6 +119,7 @@ |
| // |
| |
| public void enableRemoteAccessControls(boolean enable) { |
| + if (viewer.ftpOnly) {return;} |
| ctrlAltDelButton.setEnabled(enable); |
| } |
| |
| @@ -163,9 +173,19 @@ |
| } |
| else if (evt.getSource() == ftpButton) |
| { |
| - viewer.ftp.setVisible(!viewer.ftp.isVisible()); |
| +// begin runge/x11vnc |
| + if (viewer.ftpOnly) { |
| + viewer.vncFrame.setVisible(false); |
| + } |
| + viewer.ftp.setSavedLocations(); |
| + if (viewer.ftp.isVisible()) { |
| + viewer.ftp.doClose(); |
| + } else { |
| + viewer.ftp.doOpen(); |
| + } |
| +// end runge/x11vnc |
| viewer.rfb.readServerDriveList(); |
| - |
| + |
| } |
| } |
| } |
| diff -Naur JavaViewer.orig/FTPFrame.java JavaViewer/FTPFrame.java |
| --- JavaViewer.orig/FTPFrame.java 2005-03-15 23:53:14.000000000 -0500 |
| +++ JavaViewer/FTPFrame.java 2009-01-13 09:48:30.000000000 -0500 |
| @@ -24,8 +24,17 @@ |
| import java.io.*; |
| import java.util.ArrayList; |
| import java.util.Vector; |
| +import java.util.Date; |
| import javax.swing.*; |
| |
| +import java.nio.ByteBuffer; |
| +import java.nio.CharBuffer; |
| +import java.nio.charset.*; |
| + |
| +// begin runge/x11vnc |
| +import java.util.Arrays; |
| +// end runge/x11vnc |
| + |
| |
| /* |
| * Created on Feb 25, 2004 |
| @@ -74,12 +83,31 @@ |
| public javax.swing.JTextField connectionStatus = null; |
| public boolean updateDriveList; |
| private Vector remoteList = null; |
| + private Vector remoteListInfo = null; |
| private Vector localList = null; |
| + private Vector localListInfo = null; |
| private File currentLocalDirectory = null; // Holds the current local Directory |
| private File currentRemoteDirectory = null; // Holds the current remote Directory |
| private File localSelection = null; // Holds the currently selected local file |
| private String remoteSelection = null; // Holds the currently selected remote file |
| public String selectedTable = null; |
| + |
| +// begin runge/x11vnc |
| + private javax.swing.JButton viewButton = null; |
| + private javax.swing.JButton refreshButton = null; |
| + public File saveLocalDirectory = null; |
| + public long saveLocalDirectoryTime = 0; |
| + public int saveLocalDirectoryCount = 0; |
| + public String saveRemoteDirectory = null; |
| + public long saveRemoteDirectoryTime = 0; |
| + public int saveRemoteDirectoryCount = 0; |
| + private boolean localCurrentIsDir = true; |
| + private int lastRemoteIndex = -1; |
| + private int lastLocalIndex = -1; |
| + private boolean doingShortcutDir = false; |
| + private boolean gotShortcutDir = false; |
| + private boolean ignore_events = false; |
| +// end runge/x11vnc |
| |
| // sf@2004 - Separate directories and files for better lisibility |
| private ArrayList DirsList; |
| @@ -125,11 +153,61 @@ |
| |
| void refreshRemoteLocation() |
| { |
| + |
| +//System.out.println("refreshRemoteLocation1"); |
| remoteList.clear(); |
| + remoteListInfo.clear(); |
| remoteFileTable.setListData(remoteList); |
| +System.out.println("refreshRemoteLocation '" + remoteLocation.getText() + "'"); // runge/x11vnc |
| viewer.rfb.readServerDirectory(remoteLocation.getText()); |
| } |
| |
| +// begin runge/x11vnc |
| + public void setSavedLocations() { |
| + saveLocalDirectory = currentLocalDirectory; |
| + saveLocalDirectoryTime = System.currentTimeMillis(); |
| + saveLocalDirectoryCount = 0; |
| + |
| + if (remoteLocation != null) { |
| + saveRemoteDirectory = remoteLocation.getText(); |
| +System.out.println("RemoteSave '" + saveRemoteDirectory + "'"); |
| + } |
| + saveRemoteDirectoryTime = System.currentTimeMillis(); |
| + saveRemoteDirectoryCount = 0; |
| + } |
| + |
| + private File saveLocalHack(File dir) { |
| + saveLocalDirectoryCount++; |
| +//System.out.println("L " + saveLocalDirectoryCount + " dt: " + (System.currentTimeMillis() - saveLocalDirectoryTime) + " - " + saveLocalDirectory); |
| + if (System.currentTimeMillis() > saveLocalDirectoryTime + 2000 || saveLocalDirectoryCount > 2) { |
| + saveLocalDirectory = null; |
| + } |
| + if (saveLocalDirectory != null) { |
| + currentLocalDirectory = saveLocalDirectory; |
| + localLocation.setText(saveLocalDirectory.toString()); |
| + return saveLocalDirectory; |
| + } else { |
| + return dir; |
| + } |
| + } |
| + |
| + private String saveRemoteHack(String indrive) { |
| + saveRemoteDirectoryCount++; |
| +//System.out.println("R " + saveRemoteDirectoryCount + " - " + saveRemoteDirectory); |
| + if (saveRemoteDirectory != null && saveRemoteDirectoryCount > 1) { |
| + saveRemoteDirectory = null; |
| + } |
| + if (saveRemoteDirectory != null) { |
| + if (! saveRemoteDirectory.equals("")) { |
| +System.out.println("saveRemoteHack setText + refreshRemoteLocation '" + saveRemoteDirectory + "'"); |
| + return saveRemoteDirectory; |
| + } |
| + } |
| + return indrive; |
| + } |
| +// end runge/x11vnc |
| + |
| + |
| /* |
| * Prints the list of drives on the remote directory and returns a String[]. |
| * str takes as string like A:fC:lD:lE:lF:lG:cH:c |
| @@ -143,6 +221,9 @@ |
| int size = str.length(); |
| String driveType = null; |
| String[] drive = new String[str.length() / 3]; |
| + int idx = 0, C_drive = -1, O_drive = -1; |
| + |
| +System.out.println("ComboBox: Str '" + str + "'"); |
| |
| // Loop through the string to create a String[] |
| for (int i = 0; i < size; i = i + 3) { |
| @@ -150,26 +231,68 @@ |
| driveType = str.substring(i + 2, i + 3); |
| if (driveType.compareTo("f") == 0) |
| drive[i / 3] += "\\ Floppy"; |
| - if (driveType.compareTo("l") == 0) |
| + if (driveType.compareTo("l") == 0) { |
| drive[i / 3] += "\\ Local Disk"; |
| + if (drive[i/3].substring(0,1).toUpperCase().equals("C")) { |
| + C_drive = idx; |
| + } else if (O_drive < 0) { |
| + O_drive = idx; |
| + } |
| + } |
| if (driveType.compareTo("c") == 0) |
| drive[i / 3] += "\\ CD-ROM"; |
| if (driveType.compareTo("n") == 0) |
| drive[i / 3] += "\\ Network"; |
| |
| remoteDrivesComboBox.addItem(drive[i / 3]); |
| +System.out.println("ComboBox: Add " + idx + " '" + drive[i/3] + "'"); |
| + idx++; |
| + } |
| + |
| + // runge |
| + if (viewer.ftpDropDown != null) { |
| + String[] dd = viewer.ftpDropDown.split("\\."); |
| + for (int i=0; i < dd.length; i++) { |
| + if (!dd[i].equals("")) { |
| + String s = dd[i]; |
| + if (s.startsWith("TOP_")) { |
| + s = s.substring(4); |
| + remoteDrivesComboBox.insertItemAt(" [" + s + "]", 0); |
| + } else { |
| + remoteDrivesComboBox.addItem(" [" + s + "]"); |
| + } |
| + } |
| + } |
| + } else { |
| + remoteDrivesComboBox.addItem(" [My Documents]"); |
| + remoteDrivesComboBox.addItem(" [Desktop]"); |
| + remoteDrivesComboBox.addItem(" [Home]"); |
| } |
| + |
| //sf@ - Select Drive C:as default if possible |
| boolean bFound = false; |
| - for(int i = 0; i < remoteDrivesComboBox.getItemCount() ; i++) |
| - { |
| - if(remoteDrivesComboBox.getItemAt(i).toString().substring(0,1).toUpperCase().equals("C")) |
| - { |
| - remoteDrivesComboBox.setSelectedIndex(i); |
| + |
| + if (false) { |
| + for(int i = 0; i < remoteDrivesComboBox.getItemCount() ; i++) { |
| + if(remoteDrivesComboBox.getItemAt(i).toString().substring(0,1).toUpperCase().equals("C")) { |
| + remoteDrivesComboBox.setSelectedIndex(i); |
| + bFound = true; |
| + } |
| + } |
| + } else { |
| + if (C_drive >= 0) { |
| + remoteDrivesComboBox.setSelectedIndex(C_drive); |
| + bFound = true; |
| +System.out.println("ComboBox: C_drive index: " + C_drive); |
| + } else if (O_drive >= 0) { |
| + remoteDrivesComboBox.setSelectedIndex(O_drive); |
| bFound = true; |
| +System.out.println("ComboBox: Other_drive index: " + O_drive); |
| } |
| } |
| + |
| if (!bFound) remoteDrivesComboBox.setSelectedIndex(0); |
| + |
| updateDriveList = false; |
| return drive; |
| } |
| @@ -185,6 +308,8 @@ |
| stopButton.setVisible(true); |
| stopButton.setEnabled(true); |
| receiveButton.setEnabled(false); |
| + viewButton.setEnabled(false); // runge/x11vnc |
| + refreshButton.setEnabled(false); |
| remoteTopButton.setEnabled(false); |
| sendButton.setEnabled(false); |
| remoteFileTable.setEnabled(false); |
| @@ -207,6 +332,8 @@ |
| stopButton.setVisible(false); |
| stopButton.setEnabled(false); |
| receiveButton.setEnabled(true); |
| + viewButton.setEnabled(true); // runge/x11vnc |
| + refreshButton.setEnabled(true); |
| remoteTopButton.setEnabled(true); |
| sendButton.setEnabled(true); |
| remoteFileTable.setEnabled(true); |
| @@ -221,10 +348,11 @@ |
| /* |
| * Print Directory prints out all the contents of a directory |
| */ |
| - void printDirectory(ArrayList a) { |
| + void printDirectory(ArrayList a, ArrayList b) { |
| |
| for (int i = 0; i < a.size(); i++) { |
| remoteList.addElement(a.get(i)); |
| + remoteListInfo.addElement(b.get(i)); |
| } |
| remoteFileTable.setListData(remoteList); |
| } |
| @@ -235,10 +363,12 @@ |
| * @return void |
| */ |
| private void initialize() { |
| + ignore_events = true; |
| this.setSize(794, 500); |
| this.setContentPane(getJContentPane()); |
| + ignore_events = false; |
| updateDriveList = true; |
| - } |
| + } |
| /** |
| * This method initializes jContentPane. This is the main content pane |
| * |
| @@ -253,6 +383,33 @@ |
| jContentPane.add(getRemotePanel(), java.awt.BorderLayout.EAST); |
| jContentPane.add(getLocalPanel(), java.awt.BorderLayout.WEST); |
| jContentPane.add(getButtonPanel(), java.awt.BorderLayout.CENTER); |
| + |
| + KeyStroke stroke = KeyStroke.getKeyStroke(KeyEvent.VK_ESCAPE, 0); |
| + AbstractAction escapeAction = new AbstractAction() { |
| + public void actionPerformed(ActionEvent actionEvent) { |
| + System.out.println("Escape Pressed"); |
| + if (viewer.ftpOnly) { |
| + System.out.println("exiting..."); |
| + System.exit(0); |
| + } else { |
| + doClose(); |
| + } |
| + } |
| + }; |
| + jContentPane.getInputMap(JComponent.WHEN_ANCESTOR_OF_FOCUSED_COMPONENT).put(stroke, "escapeAction"); |
| + jContentPane.getInputMap().put(stroke, "escapeAction"); |
| + jContentPane.getActionMap().put("escapeAction", escapeAction); |
| + |
| + stroke = KeyStroke.getKeyStroke(KeyEvent.VK_R, InputEvent.CTRL_MASK); |
| + AbstractAction resetAction = new AbstractAction() { |
| + public void actionPerformed(ActionEvent actionEvent) { |
| + System.out.println("Ctrl-R Pressed"); |
| + doReset(); |
| + } |
| + }; |
| + jContentPane.getInputMap(JComponent.WHEN_ANCESTOR_OF_FOCUSED_COMPONENT).put(stroke, "resetAction"); |
| + jContentPane.getInputMap().put(stroke, "resetAction"); |
| + jContentPane.getActionMap().put("resetAction", resetAction); |
| } |
| return jContentPane; |
| } |
| @@ -270,6 +427,7 @@ |
| topPanelLocal.add(getLocalMachineLabel(), java.awt.BorderLayout.CENTER); |
| topPanelLocal.add(getLocalTopButton(), java.awt.BorderLayout.EAST); |
| topPanelLocal.setBackground(java.awt.Color.lightGray); |
| +//System.out.println("getTopPanelLocal"); |
| } |
| return topPanelLocal; |
| } |
| @@ -288,6 +446,7 @@ |
| topPanelRemote.add(getRemoteMachineLabel(), java.awt.BorderLayout.CENTER); |
| topPanelRemote.add(getRemoteTopButton(), java.awt.BorderLayout.EAST); |
| topPanelRemote.setBackground(java.awt.Color.lightGray); |
| +//System.out.println("getTopPanelRemote"); |
| } |
| return topPanelRemote; |
| } |
| @@ -301,6 +460,7 @@ |
| if (topPanelCenter == null) { |
| topPanelCenter = new javax.swing.JPanel(); |
| topPanelCenter.add(getDummyButton(), null); |
| +//System.out.println("getTopPanelCenter"); |
| } |
| return topPanelCenter; |
| } |
| @@ -328,6 +488,7 @@ |
| topPanel.add(getRemoteTopButton(), null); |
| topPanel.setBackground(java.awt.Color.lightGray); |
| */ |
| +//System.out.println("getTopPanel"); |
| } |
| return topPanel; |
| } |
| @@ -348,6 +509,7 @@ |
| statusPanel.add(getJProgressBar(), null); |
| statusPanel.add(getConnectionStatus(), null); |
| statusPanel.setBackground(java.awt.Color.lightGray); |
| +//System.out.println("getStatusPanel"); |
| |
| } |
| return statusPanel; |
| @@ -368,6 +530,7 @@ |
| remotePanel.add(getRemoteScrollPane(), null); |
| remotePanel.add(getRemoteStatus(), null); |
| remotePanel.setBackground(java.awt.Color.lightGray); |
| +//System.out.println("getRemotePanel"); |
| } |
| return remotePanel; |
| } |
| @@ -390,6 +553,7 @@ |
| localPanel.setComponentOrientation( |
| java.awt.ComponentOrientation.UNKNOWN); |
| localPanel.setName("localPanel"); |
| +//System.out.println("getLocalPanel"); |
| } |
| return localPanel; |
| } |
| @@ -405,12 +569,15 @@ |
| buttonPanel = new javax.swing.JPanel(); |
| buttonPanel.setLayout(null); |
| buttonPanel.add(getReceiveButton(), null); |
| + buttonPanel.add(getRefreshButton(), null); // runge/x11vnc |
| + buttonPanel.add(getViewButton(), null); // runge/x11vnc |
| buttonPanel.add(getNewFolderButton(), null); |
| buttonPanel.add(getCloseButton(), null); |
| buttonPanel.add(getDeleteButton(), null); |
| buttonPanel.add(getSendButton(), null); |
| buttonPanel.add(getStopButton(), null); |
| buttonPanel.setBackground(java.awt.Color.lightGray); |
| +//System.out.println("getButtonPanel"); |
| } |
| return buttonPanel; |
| } |
| @@ -422,10 +589,11 @@ |
| private javax.swing.JButton getSendButton() { |
| if (sendButton == null) { |
| sendButton = new javax.swing.JButton(); |
| - sendButton.setBounds(20, 30, 97, 25); |
| + sendButton.setBounds(15, 30, 107, 25); // runge/x11vnc |
| sendButton.setText("Send >>"); |
| sendButton.setName("sendButton"); |
| sendButton.addActionListener(this); |
| +//System.out.println("getSendButton"); |
| |
| } |
| return sendButton; |
| @@ -438,7 +606,7 @@ |
| private javax.swing.JButton getReceiveButton() { |
| if (receiveButton == null) { |
| receiveButton = new javax.swing.JButton(); |
| - receiveButton.setBounds(20, 60, 97, 25); |
| + receiveButton.setBounds(15, 60, 107, 25); // runge/x11vnc |
| receiveButton.setText("<< Receive"); |
| receiveButton.setName("receiveButton"); |
| receiveButton.addActionListener(this); |
| @@ -453,7 +621,7 @@ |
| private javax.swing.JButton getDeleteButton() { |
| if (deleteButton == null) { |
| deleteButton = new javax.swing.JButton(); |
| - deleteButton.setBounds(20, 110, 97, 25); |
| + deleteButton.setBounds(15, 110, 107, 25); // runge/x11vnc |
| deleteButton.setText("Delete File"); |
| deleteButton.setName("deleteButton"); |
| deleteButton.addActionListener(this); |
| @@ -468,7 +636,7 @@ |
| private javax.swing.JButton getNewFolderButton() { |
| if (newFolderButton == null) { |
| newFolderButton = new javax.swing.JButton(); |
| - newFolderButton.setBounds(20, 140, 97, 25); |
| + newFolderButton.setBounds(15, 140, 107, 25); // runge/x11vnc |
| newFolderButton.setText("New Folder"); |
| newFolderButton.setName("newFolderButton"); |
| newFolderButton.addActionListener(this); |
| @@ -476,6 +644,39 @@ |
| return newFolderButton; |
| } |
| |
| +// begin runge/x11vnc |
| + /** |
| + * This method initializes refreshButton |
| + * |
| + * @return javax.swing.JButton |
| + */ |
| + private javax.swing.JButton getRefreshButton() { |
| + if (refreshButton == null) { |
| + refreshButton = new javax.swing.JButton(); |
| + refreshButton.setBounds(15, 170, 107, 25); |
| + refreshButton.setText("Refresh"); |
| + refreshButton.setName("refreshButton"); |
| + refreshButton.addActionListener(this); |
| + } |
| + return refreshButton; |
| + } |
| + /** |
| + * This method initializes viewButton |
| + * |
| + * @return javax.swing.JButton |
| + */ |
| + private javax.swing.JButton getViewButton() { |
| + if (viewButton == null) { |
| + viewButton = new javax.swing.JButton(); |
| + viewButton.setBounds(15, 200, 107, 25); |
| + viewButton.setText("View File"); |
| + viewButton.setName("viewButton"); |
| + viewButton.addActionListener(this); |
| + } |
| + return viewButton; |
| + } |
| +// end runge/x11vnc |
| + |
| /** |
| * This method initializes stopButton |
| * |
| @@ -486,7 +687,7 @@ |
| if (stopButton == null) |
| { |
| stopButton = new javax.swing.JButton(); |
| - stopButton.setBounds(20, 200, 97, 25); |
| + stopButton.setBounds(15, 230, 107, 25); // runge/x11vnc |
| stopButton.setText("Stop"); |
| stopButton.setName("stopButton"); |
| stopButton.addActionListener(this); |
| @@ -503,8 +704,12 @@ |
| private javax.swing.JButton getCloseButton() { |
| if (closeButton == null) { |
| closeButton = new javax.swing.JButton(); |
| - closeButton.setBounds(20, 325, 97, 25); |
| - closeButton.setText("Close"); |
| + closeButton.setBounds(15, 325, 107, 25); // runge/x11vnc |
| + if (viewer.ftpOnly) { |
| + closeButton.setText("Quit"); |
| + } else { |
| + closeButton.setText("Close"); |
| + } |
| closeButton.setName("closeButton"); |
| closeButton.addActionListener(this); |
| } |
| @@ -551,6 +756,7 @@ |
| //Select the second entry (e.g. C:\) |
| // localDrivesComboBox.setSelectedIndex(1); |
| localDrivesComboBox.addActionListener(this); |
| +//System.out.println("getLocalDrivesComboBox"); |
| } |
| updateDriveList = false; |
| return localDrivesComboBox; |
| @@ -567,6 +773,7 @@ |
| remoteDrivesComboBox.setFont( |
| new java.awt.Font("Dialog", java.awt.Font.PLAIN, 10)); |
| remoteDrivesComboBox.addActionListener(this); |
| +//System.out.println("getRemoteDrivesComboBox"); |
| |
| } |
| return remoteDrivesComboBox; |
| @@ -587,6 +794,7 @@ |
| localMachineLabel.setFont( |
| new java.awt.Font("Dialog", java.awt.Font.BOLD, 11)); |
| localMachineLabel.setEditable(false); |
| +//System.out.println("getLocalMachineLabel"); |
| } |
| return localMachineLabel; |
| } |
| @@ -622,6 +830,7 @@ |
| localTopButton.setFont( |
| new java.awt.Font("Dialog", java.awt.Font.BOLD, 10)); |
| localTopButton.addActionListener(this); |
| +//System.out.println("getLocalTopButton"); |
| } |
| return localTopButton; |
| } |
| @@ -638,6 +847,7 @@ |
| remoteTopButton.setFont( |
| new java.awt.Font("Dialog", java.awt.Font.BOLD, 10)); |
| remoteTopButton.addActionListener(this); |
| +//System.out.println("getRemoteTopButton"); |
| } |
| return remoteTopButton; |
| } |
| @@ -650,9 +860,24 @@ |
| private javax.swing.JList getLocalFileTable() { |
| if (localFileTable == null) { |
| localList = new Vector(0); |
| + localListInfo = new Vector(0); |
| localFileTable = new JList(localList); |
| + MouseMotionListener mlisten = new MouseMotionAdapter() { |
| + public void mouseMoved(MouseEvent e) { |
| + int index = localFileTable.locationToIndex(e.getPoint()); |
| + if (index == lastLocalIndex) { |
| + return; |
| + } else if (index < 0) { |
| + return; |
| + } |
| + lastLocalIndex = index; |
| + connectionStatus.setText((String) localListInfo.get(index)); |
| + } |
| + }; |
| localFileTable.addMouseListener(this); |
| + localFileTable.addMouseMotionListener(mlisten); |
| localFileTable.setSelectionMode(ListSelectionModel.SINGLE_SELECTION); |
| +//System.out.println("getLocalFileTable"); |
| } |
| return localFileTable; |
| } |
| @@ -669,6 +894,7 @@ |
| localScrollPane.setFont( |
| new java.awt.Font("Dialog", java.awt.Font.PLAIN, 10)); |
| localScrollPane.setName("localFileList"); |
| +//System.out.println("getLocalScrollPane"); |
| } |
| return localScrollPane; |
| } |
| @@ -680,10 +906,25 @@ |
| private javax.swing.JList getRemoteFileTable() { |
| if (remoteFileTable == null) { |
| remoteList = new Vector(0); |
| + remoteListInfo = new Vector(0); |
| remoteFileTable = new JList(remoteList); |
| + MouseMotionListener mlisten = new MouseMotionAdapter() { |
| + public void mouseMoved(MouseEvent e) { |
| + int index = remoteFileTable.locationToIndex(e.getPoint()); |
| + if (index == lastRemoteIndex) { |
| + return; |
| + } else if (index < 0) { |
| + return; |
| + } |
| + lastRemoteIndex = index; |
| + connectionStatus.setText((String) remoteListInfo.get(index)); |
| + } |
| + }; |
| remoteFileTable.addMouseListener(this); |
| + remoteFileTable.addMouseMotionListener(mlisten); |
| remoteFileTable.setSelectedValue("C:\\", false); |
| remoteFileTable.setSelectionMode(ListSelectionModel.SINGLE_SELECTION); |
| +//System.out.println("getRemoteFileTable"); |
| |
| } |
| return remoteFileTable; |
| @@ -698,6 +939,7 @@ |
| remoteScrollPane = new javax.swing.JScrollPane(); |
| remoteScrollPane.setViewportView(getRemoteFileTable()); |
| remoteScrollPane.setPreferredSize(new java.awt.Dimension(325, 418)); |
| +//System.out.println("getRemoteScrollPane"); |
| } |
| return remoteScrollPane; |
| } |
| @@ -716,6 +958,7 @@ |
| remoteLocation.setBackground(new Color(255,255,238)); |
| remoteLocation.setFont( |
| new java.awt.Font("Dialog", java.awt.Font.PLAIN, 10)); |
| +//System.out.println("getRemoteLocation"); |
| } |
| return remoteLocation; |
| } |
| @@ -732,6 +975,7 @@ |
| localLocation.setBackground( new Color(255,255,238)); |
| localLocation.setFont( |
| new java.awt.Font("Dialog", java.awt.Font.PLAIN, 10)); |
| +//System.out.println("getLocalLocation"); |
| } |
| return localLocation; |
| } |
| @@ -748,6 +992,7 @@ |
| localStatus.setFont( |
| new java.awt.Font("Dialog", java.awt.Font.PLAIN, 10)); |
| localStatus.setEditable(false); |
| +//System.out.println("getLocalStatus"); |
| } |
| return localStatus; |
| } |
| @@ -764,6 +1009,7 @@ |
| remoteStatus.setFont( |
| new java.awt.Font("Dialog", java.awt.Font.PLAIN, 10)); |
| remoteStatus.setEditable(false); |
| +//System.out.println("getRemoteStatus"); |
| } |
| return remoteStatus; |
| } |
| @@ -777,9 +1023,10 @@ |
| historyComboBox = new javax.swing.JComboBox(); |
| historyComboBox.setFont( |
| new java.awt.Font("Dialog", java.awt.Font.BOLD, 10)); |
| - historyComboBox.insertItemAt(new String("Pulldown to view history ..."),0); |
| + historyComboBox.insertItemAt(new String("Pulldown to view history; Press Escape to Close/Quit; Press Ctrl-R to Reset Panel."),0); |
| historyComboBox.setSelectedIndex(0); |
| historyComboBox.addActionListener(this); |
| +//System.out.println("getHistoryComboBox"); |
| } |
| return historyComboBox; |
| } |
| @@ -791,6 +1038,7 @@ |
| private javax.swing.JProgressBar getJProgressBar() { |
| if (jProgressBar == null) { |
| jProgressBar = new javax.swing.JProgressBar(); |
| +//System.out.println("getJProgressBar"); |
| } |
| return jProgressBar; |
| } |
| @@ -806,6 +1054,7 @@ |
| connectionStatus.setBackground(java.awt.Color.lightGray); |
| connectionStatus.setFont( |
| new java.awt.Font("Dialog", java.awt.Font.PLAIN, 10)); |
| +//System.out.println("getConnectionStatus"); |
| } |
| connectionStatus.setEditable(false); |
| return connectionStatus; |
| @@ -815,7 +1064,12 @@ |
| * Implements Action listener. |
| */ |
| public void actionPerformed(ActionEvent evt) { |
| - System.out.println(evt.getSource()); |
| +// System.out.println(evt.getSource()); |
| + |
| + if (ignore_events) { |
| + System.out.println("ignore_events: " + evt.getSource()); |
| + return; |
| + } |
| |
| if (evt.getSource() == closeButton) |
| { // Close Button |
| @@ -829,15 +1083,27 @@ |
| { |
| doReceive(); |
| } |
| +// begin runge/x11vnc |
| + else if (evt.getSource() == viewButton) |
| + { |
| + doView(); |
| + } |
| +// end runge/x11vnc |
| else if (evt.getSource() == localDrivesComboBox) |
| { |
| changeLocalDrive(); |
| } |
| else if (evt.getSource() == remoteDrivesComboBox) |
| { |
| +//System.out.println("remoteDrivesComboBox"); // runge/x11vnc |
| changeRemoteDrive(); |
| - remoteList.clear(); |
| - remoteFileTable.setListData(remoteList); |
| + |
| + // are these really needed? changeRemoteDrive() does them at the end. |
| + if (false) { |
| + remoteList.clear(); |
| + remoteListInfo.clear(); |
| + remoteFileTable.setListData(remoteList); |
| + } |
| } |
| else if (evt.getSource() == localTopButton) |
| { |
| @@ -845,12 +1111,17 @@ |
| } |
| else if (evt.getSource() == remoteTopButton) |
| { |
| +//System.out.println("remoteTopButton"); // runge/x11vnc |
| changeRemoteDrive(); |
| } |
| else if(evt.getSource() == deleteButton) |
| { |
| doDelete(); |
| } |
| + else if(evt.getSource() == refreshButton) |
| + { |
| + doRefresh(); |
| + } |
| else if(evt.getSource()==newFolderButton) |
| { |
| doNewFolder(); |
| @@ -864,7 +1135,7 @@ |
| |
| private void doNewFolder() |
| { |
| - String name = JOptionPane.showInputDialog(null,"Enter new directory name", "Create New Directory", JOptionPane.QUESTION_MESSAGE); |
| + String name = JOptionPane.showInputDialog(jContentPane,"Enter new directory name", "Create New Directory", JOptionPane.QUESTION_MESSAGE); |
| if(selectedTable.equals("remote")) |
| { |
| name = remoteLocation.getText()+name; |
| @@ -880,34 +1151,106 @@ |
| historyComboBox.setSelectedIndex(0); |
| } |
| } |
| - private void doClose() |
| + public void doClose() |
| { |
| + if (viewer.ftpOnly) { |
| + viewer.disconnect(); |
| + return; |
| + } |
| try { |
| this.setVisible(false); |
| - viewer.rfb.writeFramebufferUpdateRequest( |
| - 0, |
| - 0, |
| - viewer.rfb.framebufferWidth, |
| - viewer.rfb.framebufferHeight, |
| - true); |
| + viewer.rfb.writeFramebufferUpdateRequest(0, 0, viewer.rfb.framebufferWidth, |
| + viewer.rfb.framebufferHeight, true); |
| + |
| + if (false) { |
| + this.dispose(); |
| + jContentPane = null; |
| + } |
| } catch (IOException e) { |
| // TODO Auto-generated catch block |
| e.printStackTrace(); |
| } |
| } |
| + private void unSwing() { |
| + jContentPane = null; |
| + topPanel = null; |
| + topPanelLocal = null; |
| + topPanelRemote = null; |
| + topPanelCenter = null; |
| + statusPanel = null; |
| + remotePanel = null; |
| + localPanel = null; |
| + buttonPanel = null; |
| + sendButton = null; |
| + receiveButton = null; |
| + deleteButton = null; |
| + newFolderButton = null; |
| + stopButton = null; |
| + closeButton = null; |
| + dummyButton = null; |
| + localDrivesComboBox = null; |
| + remoteDrivesComboBox = null; |
| + localMachineLabel = null; |
| + remoteMachineLabel = null; |
| + localTopButton = null; |
| + remoteTopButton = null; |
| + localScrollPane = null; |
| + localFileTable = null; |
| + remoteScrollPane = null; |
| + remoteFileTable = null; |
| + remoteLocation = null; |
| + localLocation = null; |
| + localStatus = null; |
| + remoteStatus = null; |
| + historyComboBox = null; |
| + jProgressBar = null; |
| + connectionStatus = null; |
| + viewButton = null; |
| + refreshButton = null; |
| + } |
| + |
| + public void doReset() |
| + { |
| + try { |
| + this.setVisible(false); |
| + this.dispose(); |
| + jContentPane = null; |
| + try {Thread.sleep(500);} catch (InterruptedException e) {} |
| + viewer.ftp_init(); |
| + } catch (Exception e) { |
| + // TODO Auto-generated catch block |
| + e.printStackTrace(); |
| + } |
| + } |
| |
| + public void doOpen() |
| + { |
| + try { |
| + this.setVisible(true); |
| + if (false) { |
| + this.initialize(); |
| + } |
| + } catch (Exception e) { |
| + // TODO Auto-generated catch block |
| + e.printStackTrace(); |
| + } |
| + } |
| private void doDelete() |
| { |
| - System.out.println("Delete Button Pressed"); |
| +// System.out.println("Delete Button Pressed"); |
| //Call this method to delete a file at server |
| if(selectedTable.equals("remote")) |
| { |
| - String sFileName = ((String) this.remoteFileTable.getSelectedValue()); |
| + Object selected = this.remoteFileTable.getSelectedValue(); |
| + if (selected == null) { |
| + return; |
| + } |
| + String sFileName = ((String) selected); |
| |
| // sf@2004 - Directory can't be deleted |
| if (sFileName.substring(0, 2).equals(" [") && sFileName.substring((sFileName.length() - 1), sFileName.length()).equals("]")) |
| { |
| - JOptionPane.showMessageDialog(null, (String)"Directory Deletion is not yet available in this version...", "FileTransfer Info", JOptionPane.INFORMATION_MESSAGE); |
| + JOptionPane.showMessageDialog(jContentPane, (String)"Directory Deletion is not yet available in this version...", "FileTransfer Info", JOptionPane.INFORMATION_MESSAGE); |
| return; |
| } |
| |
| @@ -916,7 +1259,7 @@ |
| // sf@2004 - Delete prompt |
| if (remoteList.contains(sFileName)) |
| { |
| - int r = JOptionPane.showConfirmDialog(null, "Are you sure you want to delete the file \n< " + sFileName + " >\n on Remote Machine ?", "File Transfer Warning", JOptionPane.YES_NO_OPTION); |
| + int r = JOptionPane.showConfirmDialog(jContentPane, "Are you sure you want to delete the file \n< " + sFileName + " >\n on Remote Machine ?", "File Transfer Warning", JOptionPane.YES_NO_OPTION); |
| if (r == JOptionPane.NO_OPTION) |
| return; |
| } |
| @@ -926,18 +1269,22 @@ |
| } |
| else |
| { |
| - String sFileName = ((String) this.localFileTable.getSelectedValue()); |
| + Object selected = this.localFileTable.getSelectedValue(); |
| + if (selected == null) { |
| + return; |
| + } |
| + String sFileName = ((String) selected); |
| |
| // sf@2004 - Directory can't be deleted |
| if (sFileName.substring(0, 2).equals(" [") && sFileName.substring((sFileName.length() - 1), sFileName.length()).equals("]")) |
| { |
| - JOptionPane.showMessageDialog(null, (String)"Directory Deletion is not yet available in this version...", "FileTransfer Info", JOptionPane.INFORMATION_MESSAGE); |
| + JOptionPane.showMessageDialog(jContentPane, (String)"Directory Deletion is not yet available in this version...", "FileTransfer Info", JOptionPane.INFORMATION_MESSAGE); |
| return; |
| } |
| // sf@2004 - Delete prompt |
| if (localList.contains(sFileName)) |
| { |
| - int r = JOptionPane.showConfirmDialog(null, "Are you sure you want to delete the file \n< " + sFileName + " >\n on Local Machine ?", "File Transfer Warning", JOptionPane.YES_NO_OPTION); |
| + int r = JOptionPane.showConfirmDialog(jContentPane, "Are you sure you want to delete the file \n< " + sFileName + " >\n on Local Machine ?", "File Transfer Warning", JOptionPane.YES_NO_OPTION); |
| if (r == JOptionPane.NO_OPTION) |
| return; |
| } |
| @@ -952,21 +1299,25 @@ |
| |
| private void doReceive() |
| { |
| - System.out.println("Received Button Pressed"); |
| +// System.out.println("Received Button Pressed"); |
| |
| - String sFileName = ((String) this.remoteFileTable.getSelectedValue()); |
| + Object selected = this.remoteFileTable.getSelectedValue(); |
| + if (selected == null) { |
| + return; |
| + } |
| + String sFileName = ((String) selected); |
| |
| // sf@2004 - Directory can't be transfered |
| if (sFileName.substring(0, 2).equals(" [") && sFileName.substring((sFileName.length() - 1), sFileName.length()).equals("]")) |
| { |
| - JOptionPane.showMessageDialog(null, (String)"Directory Transfer is not yet available in this version...", "FileTransfer Info", JOptionPane.INFORMATION_MESSAGE); |
| + JOptionPane.showMessageDialog(jContentPane, (String)"Directory Transfer is not yet available in this version...", "FileTransfer Info", JOptionPane.INFORMATION_MESSAGE); |
| return; |
| } |
| |
| // sf@2004 - Overwrite prompt |
| if (localList.contains(sFileName)) |
| { |
| - int r = JOptionPane.showConfirmDialog(null, "The file < " + sFileName + " >\n already exists on Local Machine\n Are you sure you want to overwrite it ?", "File Transfer Warning", JOptionPane.YES_NO_OPTION); |
| + int r = JOptionPane.showConfirmDialog(jContentPane, "The file < " + sFileName + " >\n already exists on Local Machine\n Are you sure you want to overwrite it ?", "File Transfer Warning", JOptionPane.YES_NO_OPTION); |
| if (r == JOptionPane.NO_OPTION) |
| return; |
| } |
| @@ -979,23 +1330,101 @@ |
| viewer.rfb.requestRemoteFile(remoteFileName,localDestinationPath); |
| } |
| |
| +// begin runge/x11vnc |
| + private void doRefresh() |
| + { |
| + System.out.println("Refreshing Local and Remote."); |
| + refreshLocalLocation(); |
| + refreshRemoteLocation(); |
| + } |
| + |
| + private void doView() |
| + { |
| +// System.out.println("View Button Pressed"); |
| + |
| + if (selectedTable == null) { |
| + return; |
| + } |
| + if (selectedTable.equals("remote")) { |
| + viewRemote(); |
| + } else if (selectedTable.equals("local")) { |
| + viewLocal(); |
| + } |
| + } |
| + |
| + private File doReceiveTmp() |
| + { |
| + |
| + if (remoteFileTable == null) { |
| + return null; |
| + } |
| + Object selected = this.remoteFileTable.getSelectedValue(); |
| + if (selected == null) { |
| + return null; |
| + } |
| + String sFileName = ((String) selected); |
| + |
| + if (sFileName == null) { |
| + return null; |
| + } |
| + |
| + // sf@2004 - Directory can't be transfered |
| + if (sFileName.substring(0, 2).equals(" [") && sFileName.substring((sFileName.length() - 1), sFileName.length()).equals("]")) |
| + { |
| + return null; |
| + } |
| + |
| + File tmp = null; |
| + try { |
| + tmp = File.createTempFile("ULTRAFTP", ".txt"); |
| + } catch (Exception e) { |
| + return null; |
| + } |
| + |
| + //updateHistory("Downloaded " + localSelection.toString()); |
| + String remoteFileName = this.remoteLocation.getText(); |
| + remoteFileName+= ((String) this.remoteFileTable.getSelectedValue()).substring(1); |
| + System.out.println("remoteFileName: " + remoteFileName); |
| +if (false) { |
| + char[] b = remoteFileName.toCharArray(); |
| + for (int n = 0; n < b.length; n++) { |
| + System.out.print(Integer.toHexString(b[n]) + " "); |
| + } |
| + System.out.println(""); |
| + for (int n = 0; n < b.length; n++) { |
| + System.out.print(b[n]); |
| + } |
| + System.out.println(""); |
| +} |
| + |
| + String localDestinationPath = tmp.getAbsolutePath(); |
| + viewer.rfb.requestRemoteFile(remoteFileName,localDestinationPath); |
| + System.out.println("ReceiveTmp: " + localDestinationPath); |
| + return tmp; |
| + } |
| +// end runge/x11vnc |
| + |
| private void doSend() |
| { |
| - System.out.println("Send Button Pressed"); |
| +// System.out.println("Send Button Pressed"); |
| |
| - String sFileName = ((String) this.localFileTable.getSelectedValue()); |
| + Object selected = this.localFileTable.getSelectedValue(); |
| + if (selected == null) { |
| + return; |
| + } |
| + String sFileName = ((String) selected); |
| |
| // sf@2004 - Directory can't be transfered |
| if (sFileName.substring(0, 2).equals(" [") && sFileName.substring((sFileName.length() - 1), sFileName.length()).equals("]")) |
| { |
| - JOptionPane.showMessageDialog(null, (String)"Directory Transfer is not yet available in this version...", "FileTransfer Info", JOptionPane.INFORMATION_MESSAGE); |
| + JOptionPane.showMessageDialog(jContentPane, (String)"Directory Transfer is not yet available in this version...", "FileTransfer Info", JOptionPane.INFORMATION_MESSAGE); |
| return; |
| } |
| |
| // sf@2004 - Overwrite prompt |
| if (remoteList.contains(sFileName)) |
| { |
| - int r = JOptionPane.showConfirmDialog(null, "The file < " + sFileName + " >\n already exists on Remote Machine\n Are you sure you want to overwrite it ?", "File Transfer Warning", JOptionPane.YES_NO_OPTION); |
| + int r = JOptionPane.showConfirmDialog(jContentPane, "The file < " + sFileName + " >\n already exists on Remote Machine\n Are you sure you want to overwrite it ?", "File Transfer Warning", JOptionPane.YES_NO_OPTION); |
| if (r == JOptionPane.NO_OPTION) |
| return; |
| } |
| @@ -1013,6 +1442,7 @@ |
| // |
| private void doStop() |
| { |
| + System.out.println("** Current Transfer Aborted **"); |
| viewer.rfb.fAbort = true; |
| } |
| /** |
| @@ -1024,6 +1454,14 @@ |
| System.out.println("History: " + message); |
| historyComboBox.insertItemAt(new String(message), 0); |
| } |
| + |
| + public void receivedRemoteDirectoryName(String str) { |
| + if (doingShortcutDir) { |
| + if (str.length() > 1) { |
| + remoteLocation.setText(str); |
| + } |
| + } |
| + } |
| |
| /** |
| * This method updates the file table to the current selection of the remoteComboBox |
| @@ -1034,11 +1472,44 @@ |
| remoteSelection = null; |
| |
| if (!updateDriveList) { |
| - String drive = remoteDrivesComboBox.getSelectedItem().toString().substring(0,1)+ ":\\"; |
| - viewer.rfb.readServerDirectory(drive); |
| - remoteLocation.setText(drive); |
| +//System.out.println("changeRemoteDrive-A " + drive); // begin runge/x11vnc |
| + Object selected = remoteDrivesComboBox.getSelectedItem(); |
| + if (selected != null) { |
| + String instr = selected.toString(); |
| + if (instr != null) { |
| +System.out.println("changeRemoteDrive: instr='" + instr + "'"); |
| + String drive = instr.substring(0,1)+ ":\\"; |
| + if (instr.startsWith(" [")) { |
| + int idx = instr.lastIndexOf(']'); |
| + if (idx > 2) { |
| + drive = instr.substring(2, idx); |
| + } else { |
| + drive = instr.substring(2); |
| + } |
| + if (drive.equals("Home")) { |
| + drive = ""; |
| + } |
| + drive += "\\"; |
| + doingShortcutDir = true; |
| + } else { |
| + doingShortcutDir = false; |
| + drive = saveRemoteHack(drive); |
| + } |
| + gotShortcutDir = false; |
| + viewer.rfb.readServerDirectory(drive); |
| + if (!gotShortcutDir) { |
| + remoteLocation.setText(drive); |
| + } |
| + } else { |
| +System.out.println("changeRemoteDrive: instr null"); |
| + } |
| + } else { |
| +System.out.println("changeRemoteDrive: selection null"); |
| + } |
| +//System.out.println("changeRemoteDrive-B " + drive); // end runge/x11vnc |
| } |
| remoteList.clear(); |
| + remoteListInfo.clear(); |
| remoteFileTable.setListData(remoteList); |
| } |
| /** |
| @@ -1048,6 +1519,7 @@ |
| private void changeLocalDrive() |
| { |
| File currentDrive = new File(localDrivesComboBox.getSelectedItem().toString()); |
| +System.out.println("changeLocalDrive " + currentDrive.toString()); // runge/x11vnc |
| if(currentDrive.canRead()) |
| { |
| localSelection = null; |
| @@ -1057,9 +1529,11 @@ |
| else |
| { |
| localList.clear(); |
| + localListInfo.clear(); |
| localStatus.setText("WARNING: Drive " + localDrivesComboBox.getSelectedItem().toString()); |
| connectionStatus.setText(" > WARNING - Local Drive unavailable (possibly restricted access or media not present)"); |
| } |
| + |
| } |
| /** |
| * Determines which FileTable was double-clicked and updates the table |
| @@ -1098,10 +1572,18 @@ |
| selectedTable = "remote"; |
| localFileTable.setBackground(new Color(238, 238, 238)); |
| remoteFileTable.setBackground(new Color(255, 255, 255)); |
| - String name = (remoteFileTable.getSelectedValue().toString()).substring(1); |
| + Object selected = remoteFileTable.getSelectedValue(); |
| + if (selected == null) { |
| + return; |
| + } |
| + String selstr = selected.toString(); |
| + if (selstr == null) { |
| + return; |
| + } |
| + String name = selstr.substring(1); |
| if( !name.substring(0, 2).equals(" [")) |
| remoteSelection = remoteLocation.getText() + name.substring(0, name.length()); |
| - |
| + |
| } |
| |
| /* |
| @@ -1115,10 +1597,38 @@ |
| localFileTable.setBackground(new Color(255, 255, 255)); |
| File currentSelection = new File(currentLocalDirectory, getTrimmedSelection()); |
| |
| - if(currentSelection.isFile()) |
| +// begin runge/x11vnc |
| + // localSelection = currentSelection.getAbsoluteFile(); |
| + if(currentSelection.isFile()) { |
| localSelection = currentSelection.getAbsoluteFile(); |
| + localCurrentIsDir = false; |
| + } else { |
| + localCurrentIsDir = true; |
| + } |
| +// end runge/x11vnc |
| |
| } |
| + |
| +// begin runge/x11vnc |
| + private void viewRemote() { |
| + File tmp = doReceiveTmp(); |
| + if (tmp == null) { |
| + return; |
| + } |
| + TextViewer tv = new TextViewer("Remote: " + remoteSelection, tmp, true); |
| + } |
| + private void viewLocal() { |
| + if (localSelection == null) { |
| + return; |
| + } |
| + if (localCurrentIsDir) { |
| + return; |
| + } |
| + File loc = new File(localSelection.toString()); |
| + TextViewer tv = new TextViewer("Local: " + localSelection.toString(), loc, false); |
| + } |
| +// end runge/x11vnc |
| + |
| /** |
| * Updates the Remote File Table based on selection. Called from mouseClicked handler |
| */ |
| @@ -1126,20 +1636,29 @@ |
| String name = null; |
| String action = null; |
| String drive = null; |
| - name = (remoteFileTable.getSelectedValue().toString()).substring(1); |
| + Object selected = remoteFileTable.getSelectedValue(); |
| + if (selected == null) { |
| + return; |
| + } |
| + String sname = selected.toString(); |
| + if (sname == null) { |
| + return; |
| + } |
| + name = sname.substring(1); |
| |
| if (name.equals("[..]")) |
| { |
| action = "up"; |
| remoteSelection = null; |
| drive = remoteLocation.getText().substring(0, remoteLocation.getText().length() - 1); |
| - // JOptionPane.showMessageDialog(null, (String)drive, "FileTransfer DEBUG", JOptionPane.INFORMATION_MESSAGE); |
| + // JOptionPane.showMessageDialog(jContentPane, (String)drive, "FileTransfer DEBUG", JOptionPane.INFORMATION_MESSAGE); |
| int index = drive.lastIndexOf("\\"); |
| drive = drive.substring(0, index + 1); |
| |
| remoteLocation.setText(drive); |
| viewer.rfb.readServerDirectory(drive); |
| remoteList.clear(); |
| + remoteListInfo.clear(); |
| remoteFileTable.setListData(remoteList); |
| } |
| else if (!name.substring(0, 2).equals(" [") && !name.substring((name.length() - 1), name.length()).equals("]")) |
| @@ -1149,6 +1668,7 @@ |
| remoteSelection = remoteLocation.getText() + name.substring(0, name.length()); |
| drive = remoteLocation.getText(); |
| // ?? |
| + viewRemote(); // runge/x11vnc |
| } |
| else |
| { |
| @@ -1159,10 +1679,12 @@ |
| remoteLocation.setText(drive); |
| viewer.rfb.readServerDirectory(drive); |
| remoteList.clear(); |
| + remoteListInfo.clear(); |
| remoteFileTable.setListData(remoteList); |
| } |
| //remoteLocation.setText(drive); |
| } |
| + |
| /** |
| * Updates the Local File Table based on selection. Called from MouseClicked handler |
| */ |
| @@ -1188,6 +1710,7 @@ |
| else if (currentSelection.isFile()) |
| { |
| localSelection = currentSelection.getAbsoluteFile(); |
| + viewLocal(); // runge/x11vnc |
| } |
| else if (currentSelection.isDirectory()) |
| { |
| @@ -1201,13 +1724,22 @@ |
| * |
| */ |
| private String getTrimmedSelection(){ |
| - String currentSelection = (localFileTable.getSelectedValue().toString()).substring(1); |
| - if(currentSelection.substring(0,1).equals("[") && |
| - currentSelection.substring(currentSelection.length()-1,currentSelection.length()).equals("]")){ |
| - return currentSelection.substring(1,currentSelection.length()-1); |
| - } else { |
| - return currentSelection; |
| - } |
| + String currentSelection = ""; |
| + Object selected = localFileTable.getSelectedValue(); |
| + if (selected == null) { |
| + return currentSelection; |
| + } |
| + String selstr = selected.toString(); |
| + if (selstr == null) { |
| + return currentSelection; |
| + } |
| + currentSelection = selstr.substring(1); |
| + if(currentSelection.substring(0,1).equals("[") && |
| + currentSelection.substring(currentSelection.length()-1,currentSelection.length()).equals("]")){ |
| + return currentSelection.substring(1,currentSelection.length()-1); |
| + } else { |
| + return currentSelection; |
| + } |
| } |
| |
| /* |
| @@ -1241,36 +1773,148 @@ |
| return null; |
| } |
| |
| + String timeStr(long t) { |
| + Date date = new Date(t); |
| + return date.toString(); |
| + } |
| + String dotPast(double f, int n) { |
| + String fs = "" + f; |
| + int i = fs.lastIndexOf(".") + n; |
| + if (i >= 0) { |
| + int len = fs.length(); |
| + if (i >= len) { |
| + i = len-1; |
| + } |
| + fs = fs.substring(0, i); |
| + } |
| + return fs; |
| + } |
| + String sizeStr(int s) { |
| + if (s < 0) { |
| + return s + "? B"; |
| + } else if (s < 1024) { |
| + return s + " B"; |
| + } else if (s < 1024 * 1024) { |
| + double k = s / 1024.0; |
| + String ks = dotPast(k, 3); |
| + |
| + return s + " (" + ks + " KB)"; |
| + } else { |
| + double m = s / (1024.0*1024.0); |
| + String ms = dotPast(m, 3); |
| + return s + " (" + ms + " MB)"; |
| + } |
| + } |
| + |
| + int max_char(String text) { |
| + int maxc = 0; |
| + char chars[] = text.toCharArray(); |
| + for (int n = 0; n < chars.length; n++) { |
| + if ((int) chars[n] > maxc) { |
| + maxc = (int) chars[n]; |
| + } |
| + } |
| + return maxc; |
| + } |
| |
| /* |
| * Navigates the local file structure up or down one directory |
| */ |
| public void changeLocalDirectory(File dir) |
| { |
| - currentLocalDirectory = dir; // Updates Global |
| + dir = saveLocalHack(dir); // runge/x11vnc |
| + |
| + if (dir == null) { |
| + connectionStatus.setText("Error changing local directory."); |
| + historyComboBox.insertItemAt(new String("> Error changing local directory."), 0); |
| + historyComboBox.setSelectedIndex(0); |
| + return; |
| + } |
| + |
| File allFiles[] = dir.listFiles(); // Reads files |
| String[] contents = dir.list(); |
| |
| + if (contents == null || allFiles == null) { |
| + connectionStatus.setText("Error changing local directory."); |
| + historyComboBox.insertItemAt(new String("> Error changing local directory."), 0); |
| + historyComboBox.setSelectedIndex(0); |
| + return; |
| + } |
| + |
| + currentLocalDirectory = dir; // Updates Global |
| +// begin runge/x11vnc |
| +System.out.println("changeLocalDirectory: " + dir.toString()); |
| + if (contents != null) { |
| + java.util.Arrays.sort(contents, String.CASE_INSENSITIVE_ORDER); |
| + for (int i = 0; i < contents.length; i++) { |
| + allFiles[i] = new File(dir, contents[i]); |
| + } |
| + } else { |
| + return; |
| + } |
| +// end runge/x11vnc |
| + |
| localList.clear(); |
| + localListInfo.clear(); |
| localList.addElement(" [..]"); |
| + localListInfo.addElement(" [..]"); |
| + |
| + ArrayList DirInfo = new ArrayList(); |
| + ArrayList FilInfo = new ArrayList(); |
| + |
| + Charset charset = Charset.forName("ISO-8859-1"); |
| + CharsetDecoder decoder = charset.newDecoder(); |
| + CharsetEncoder encoder = charset.newEncoder(); |
| |
| // Populate the Lists |
| for (int i = 0; i < contents.length; i++) |
| { |
| - if (allFiles[i].isDirectory()) |
| + String f1 = contents[i]; |
| + |
| +if (false) { |
| + |
| +System.out.println("max_char: " + max_char(f1) + " " + f1); |
| + if (max_char(f1) > 255) { |
| + try { |
| +System.out.println("bbuf1"); |
| + ByteBuffer bbuf = encoder.encode(CharBuffer.wrap(f1.toCharArray())); |
| +System.out.println("bbuf2"); |
| + CharBuffer cbuf = decoder.decode(bbuf); |
| +System.out.println("bbuf3"); |
| + f1 = cbuf.toString(); |
| +System.out.println("did bbuf: " + f1); |
| + } catch (Exception e) { |
| + ; |
| + } |
| + } |
| +} |
| + |
| + String f2 = f1; |
| + if (f2.length() < 24) { |
| + for (int ik = f2.length(); ik < 24; ik++) { |
| + f2 = f2 + " "; |
| + } |
| + } |
| + String s = f2 + " \tLastmod: " + timeStr(allFiles[i].lastModified()) + " \t\tSize: " + sizeStr((int) allFiles[i].length()); |
| + if (allFiles[i].isDirectory()) { |
| // localList.addElement("[" + contents[i] + "]"); |
| - DirsList.add(" [" + contents[i] + "]"); // sf@2004 |
| - else |
| - { |
| + DirsList.add(" [" + f1 + "]"); // sf@2004 |
| + DirInfo.add(s); |
| + } else { |
| // localList.addElement(contents[i]); |
| - FilesList.add(" " + contents[i]); // sf@2004 |
| + FilesList.add(" " + f1); // sf@2004 |
| + FilInfo.add(s); |
| } |
| } |
| // sf@2004 |
| - for (int i = 0; i < DirsList.size(); i++) |
| + for (int i = 0; i < DirsList.size(); i++) { |
| localList.addElement(DirsList.get(i)); |
| - for (int i = 0; i < FilesList.size(); i++) |
| + localListInfo.addElement(DirInfo.get(i)); |
| + } |
| + for (int i = 0; i < FilesList.size(); i++) { |
| localList.addElement(FilesList.get(i)); |
| + localListInfo.addElement(FilInfo.get(i)); |
| + } |
| |
| FilesList.clear(); |
| DirsList.clear(); |
| @@ -1296,3 +1940,147 @@ |
| } |
| |
| } // @jve:visual-info decl-index=0 visual-constraint="10,10" |
| + |
| +// begin runge/x11vnc |
| +class TextViewer extends JFrame implements ActionListener { |
| + |
| + JTextArea textArea = new JTextArea(35, 80); |
| + File file = null; |
| + JButton refreshButton; |
| + JButton dismissButton; |
| + Timer tim = null; |
| + int rcnt = 0; |
| + int tms = 250; |
| + boolean delete_it = false; |
| + TextViewer me; |
| + |
| + public TextViewer(String s, File f, boolean d) { |
| + |
| + delete_it = d; |
| + file = f; |
| + me = this; |
| + |
| + JScrollPane scrollPane = new JScrollPane(textArea, |
| + JScrollPane.VERTICAL_SCROLLBAR_ALWAYS, |
| + JScrollPane.HORIZONTAL_SCROLLBAR_ALWAYS); |
| + |
| + textArea.setEditable(false); |
| + textArea.setFont(new Font("Monospaced", Font.PLAIN, 12)); |
| + |
| + KeyStroke stroke = KeyStroke.getKeyStroke(KeyEvent.VK_ESCAPE, InputEvent.SHIFT_MASK); |
| + AbstractAction escapeAction = new AbstractAction() { |
| + public void actionPerformed(ActionEvent actionEvent) { |
| + cleanse(); |
| + me.dispose(); |
| + } |
| + }; |
| + textArea.getInputMap(JComponent.WHEN_ANCESTOR_OF_FOCUSED_COMPONENT).put(stroke, "escapeAction"); |
| + textArea.getInputMap().put(stroke, "escapeAction"); |
| + textArea.getActionMap().put("escapeAction", escapeAction); |
| + |
| + refreshButton = new JButton(); |
| + refreshButton.setText("Reload"); |
| + refreshButton.setName("refreshButton"); |
| + refreshButton.addActionListener(this); |
| + |
| + dismissButton = new JButton(); |
| + dismissButton.setText("Dismiss"); |
| + dismissButton.setName("dismissButton"); |
| + dismissButton.addActionListener(this); |
| + |
| + JPanel buttons = new JPanel(); |
| + buttons.setLayout(new BorderLayout()); |
| + buttons.add(refreshButton, BorderLayout.WEST); |
| + buttons.add(dismissButton, BorderLayout.EAST); |
| + |
| + JPanel content = new JPanel(); |
| + content.setLayout(new BorderLayout()); |
| + content.add(scrollPane, BorderLayout.CENTER); |
| + content.add(buttons, BorderLayout.SOUTH); |
| + |
| + ActionListener tsk = new ActionListener() { |
| + public void actionPerformed(ActionEvent evt) { |
| + // System.out.println("tsk"); |
| + refresh(); |
| + } |
| + }; |
| + tim = new Timer(tms, tsk); |
| + tim.start(); |
| + |
| + this.setContentPane(content); |
| + this.setTitle("TextViewer - " + s); |
| + this.pack(); |
| + this.setVisible(true); |
| + } |
| + |
| + private void refresh() { |
| + |
| + rcnt++; |
| + if (rcnt * tms > 3000 && tim != null) { |
| + tim.stop(); |
| + tim = null; |
| + } |
| + BufferedReader input = null; |
| + StringBuffer contents = new StringBuffer(); |
| + try { |
| + if (input == null) { |
| + input = new BufferedReader(new FileReader(file)); |
| + } |
| + String line = null; |
| + int i = 0; |
| + while (( line = input.readLine()) != null) { |
| + if (i == 0) { |
| + // System.out.println("read"); |
| + } |
| + i++; |
| + contents.append(line); |
| + contents.append(System.getProperty("line.separator")); |
| + } |
| + } catch (Exception e) { |
| + ; |
| + } finally { |
| + try { |
| + if (input != null) { |
| + input.close(); |
| + input = null; |
| + } |
| + } catch (Exception e) { |
| + ; |
| + } |
| + } |
| + |
| + textArea.setText(contents.toString()); |
| + textArea.setCaretPosition(0); |
| + } |
| + |
| + public void actionPerformed(ActionEvent evt) { |
| + |
| + if (evt.getSource() == refreshButton) { |
| + refresh(); |
| + } |
| + if (evt.getSource() == dismissButton) { |
| + cleanse(); |
| + this.dispose(); |
| + } |
| + } |
| + |
| + private void cleanse() { |
| + if (delete_it && file != null) { |
| + try { |
| + file.delete(); |
| + file = null; |
| + } catch (Exception e) { |
| + ; |
| + } |
| + } |
| + } |
| + |
| + protected void finalize() throws Throwable { |
| + try { |
| + cleanse(); |
| + } finally { |
| + super.finalize(); |
| + } |
| + } |
| +} |
| +// end runge/x11vnc |
| diff -Naur JavaViewer.orig/Makefile JavaViewer/Makefile |
| --- JavaViewer.orig/Makefile 2006-05-29 09:06:32.000000000 -0400 |
| +++ JavaViewer/Makefile 2010-05-18 20:53:32.000000000 -0400 |
| @@ -4,6 +4,7 @@ |
| |
| CP = cp |
| JC = javac |
| +JC_ARGS = -target 1.4 -source 1.4 |
| JAR = jar |
| ARCHIVE = VncViewer.jar |
| PAGES = index.vnc shared.vnc noshared.vnc hextile.vnc zlib.vnc tight.vnc |
| @@ -20,7 +21,7 @@ |
| all: $(CLASSES) $(ARCHIVE) |
| |
| $(CLASSES): $(SOURCES) |
| - $(JC) -O $(SOURCES) |
| + $(JC) $(JC_ARGS) -O $(SOURCES) |
| |
| $(ARCHIVE): $(CLASSES) |
| $(JAR) cf $(ARCHIVE) $(CLASSES) |
| diff -Naur JavaViewer.orig/OptionsFrame.java JavaViewer/OptionsFrame.java |
| --- JavaViewer.orig/OptionsFrame.java 2005-11-21 18:50:16.000000000 -0500 |
| +++ JavaViewer/OptionsFrame.java 2007-05-13 22:18:30.000000000 -0400 |
| @@ -144,7 +144,10 @@ |
| choices[jpegQualityIndex].select("6"); |
| choices[cursorUpdatesIndex].select("Enable"); |
| choices[useCopyRectIndex].select("Yes"); |
| - choices[eightBitColorsIndex].select("64"); |
| +// begin runge/x11vnc |
| +// choices[eightBitColorsIndex].select("64"); |
| + choices[eightBitColorsIndex].select("Full"); |
| +// end runge/x11vnc |
| choices[mouseButtonIndex].select("Normal"); |
| choices[viewOnlyIndex].select("No"); |
| choices[shareDesktopIndex].select("Yes"); |
| diff -Naur JavaViewer.orig/RfbProto.java JavaViewer/RfbProto.java |
| --- JavaViewer.orig/RfbProto.java 2006-05-24 15:14:40.000000000 -0400 |
| +++ JavaViewer/RfbProto.java 2010-11-30 22:13:58.000000000 -0500 |
| @@ -31,6 +31,7 @@ |
| import java.net.Socket; |
| import java.util.*; |
| import java.util.zip.*; |
| +import java.text.DateFormat; |
| |
| |
| class RfbProto { |
| @@ -86,8 +87,11 @@ |
| |
| // sf@2004 - FileTransfer part |
| ArrayList remoteDirsList; |
| + ArrayList remoteDirsListInfo; |
| ArrayList remoteFilesList; |
| + ArrayList remoteFilesListInfo; |
| ArrayList a; |
| + ArrayList b; |
| boolean fFTInit = true; // sf@2004 |
| boolean fFTAllowed = true; |
| boolean fAbort = false; |
| @@ -199,6 +203,10 @@ |
| // playback. |
| int numUpdatesInSession; |
| |
| +// begin runge/x11vnc |
| + int readServerDriveListCnt = -1; |
| + long readServerDriveListTime = 0; |
| +// end runge/x11vnc |
| // |
| // Constructor. Make TCP connection to RFB server. |
| // |
| @@ -207,7 +215,27 @@ |
| viewer = v; |
| host = h; |
| port = p; |
| - sock = new Socket(host, port); |
| +// begin runge/x11vnc |
| +// sock = new Socket(host, port); |
| + if (! viewer.disableSSL) { |
| + System.out.println("new SSLSocketToMe"); |
| + SSLSocketToMe ssl; |
| + try { |
| + ssl = new SSLSocketToMe(host, port, v); |
| + } catch (Exception e) { |
| + throw new IOException(e.getMessage()); |
| + } |
| + |
| + try { |
| + sock = ssl.connectSock(); |
| + } catch (Exception es) { |
| + throw new IOException(es.getMessage()); |
| + } |
| + } else { |
| + sock = new Socket(host, port); |
| + } |
| +// end runge/x11vnc |
| + |
| is = |
| new DataInputStream( |
| new BufferedInputStream(sock.getInputStream(), 16384)); |
| @@ -215,9 +243,12 @@ |
| osw = new OutputStreamWriter(sock.getOutputStream()); |
| inDirectory2 = false; |
| a = new ArrayList(); |
| + b = new ArrayList(); |
| // sf@2004 |
| remoteDirsList = new ArrayList(); |
| + remoteDirsListInfo = new ArrayList(); |
| remoteFilesList = new ArrayList(); |
| + remoteFilesListInfo = new ArrayList(); |
| |
| sendFileSource = ""; |
| } |
| @@ -420,7 +451,13 @@ |
| // |
| |
| int readServerMessageType() throws IOException { |
| - int msgType = is.readUnsignedByte(); |
| + int msgType; |
| + try { |
| + msgType = is.readUnsignedByte(); |
| + } catch (Exception e) { |
| + viewer.disconnect(); |
| + return -1; |
| + } |
| |
| // If the session is being recorded: |
| if (rec != null) { |
| @@ -600,6 +637,7 @@ |
| contentParamT = is.readUnsignedByte(); |
| contentParamT = contentParamT << 8; |
| contentParam = contentParam | contentParamT; |
| +//System.out.println("FTM: contentType " + contentType + " contentParam " + contentParam); |
| if (contentType == rfbRDrivesList || contentType == rfbDirPacket) |
| { |
| readDriveOrDirectory(contentParam); |
| @@ -610,7 +648,7 @@ |
| } |
| else if (contentType == rfbFilePacket) |
| { |
| - receiveFileChunk(); |
| + receiveFileChunk(); |
| } |
| else if (contentType == rfbEndOfFile) |
| { |
| @@ -618,6 +656,10 @@ |
| } |
| else if (contentType == rfbAbortFileTransfer) |
| { |
| + System.out.println("rfbAbortFileTransfer: fFileReceptionRunning=" |
| + + fFileReceptionRunning + " fAbort=" |
| + + fAbort + " fFileReceptionError=" |
| + + fFileReceptionError); |
| if (fFileReceptionRunning) |
| { |
| endOfReceiveFile(false); // Error |
| @@ -626,6 +668,11 @@ |
| { |
| // sf@2004 - Todo: Add TestPermission |
| // System.out.println("File Transfer Aborted!"); |
| + |
| + // runge: seems like we must at least read the remaining |
| + // 8 bytes of the header, right? |
| + int size = is.readInt(); |
| + int length = is.readInt(); |
| } |
| |
| } |
| @@ -645,6 +692,7 @@ |
| { |
| System.out.println("ContentType: " + contentType); |
| } |
| +//System.out.println("FTM: done"); |
| } |
| |
| //Refactored from readRfbFileTransferMsg() |
| @@ -662,6 +710,7 @@ |
| |
| //Refactored from readRfbFileTransferMsg() |
| public void readDriveOrDirectory(int contentParam) throws IOException { |
| +//System.out.println("RDOD: " + contentParam + " " + inDirectory2); |
| if (contentParam == rfbADrivesList) |
| { |
| readFTPMsgDriveList(); |
| @@ -688,13 +737,21 @@ |
| |
| // Internally used. Write an Rfb message to the server |
| void writeRfbFileTransferMsg( |
| - int contentType, |
| - int contentParam, |
| - long size, // 0 : compression not supported - 1 : compression supported |
| - long length, |
| - String text) throws IOException |
| + int contentType, |
| + int contentParam, |
| + long size, // 0 : compression not supported - 1 : compression supported |
| + long length, |
| + String text) throws IOException |
| { |
| byte b[] = new byte[12]; |
| + byte byteArray[]; |
| + |
| + if (viewer.dsmActive) { |
| + // need to send the rfbFileTransfer msg type twice for the plugin... |
| + byte b2[] = new byte[1]; |
| + b2[0] = (byte) rfbFileTransfer; |
| + os.write(b2); |
| + } |
| |
| b[0] = (byte) rfbFileTransfer; |
| b[1] = (byte) contentType; |
| @@ -702,7 +759,7 @@ |
| |
| byte by = 0; |
| long c = 0; |
| - length++; |
| + |
| c = size & 0xFF000000; |
| by = (byte) (c >>> 24); |
| b[4] = by; |
| @@ -716,6 +773,32 @@ |
| by = (byte) c; |
| b[7] = by; |
| |
| + if (text != null) { |
| + byte byteArray0[] = text.getBytes(); |
| + int maxc = max_char(text); |
| + if (maxc > 255) { |
| + System.out.println("writeRfbFileTransferMsg: using getBytes(\"UTF-8\")"); |
| + byteArray0 = text.getBytes("UTF-8"); |
| + } else if (maxc > 127) { |
| + System.out.println("writeRfbFileTransferMsg: using getBytes(\"ISO-8859-1\")"); |
| + byteArray0 = text.getBytes("ISO-8859-1"); |
| + } |
| + byteArray = new byte[byteArray0.length + 1]; |
| + for (int i = 0; i < byteArray0.length; i++) { |
| + byteArray[i] = byteArray0[i]; |
| + } |
| + byteArray[byteArray.length - 1] = 0; |
| +System.out.println("writeRfbFileTransferMsg: length: " + length + " -> byteArray.length: " + byteArray.length); |
| + |
| + // will equal length for ascii, ISO-8859-1, more for UTF-8 |
| + length = byteArray.length; |
| + |
| + //length++; // used to not include null byte at end. |
| + } else { |
| + String moo = "moo"; |
| + byteArray = moo.getBytes(); |
| + } |
| + |
| c = length & 0xFF000000; |
| by = (byte) (c >>> 24); |
| b[8] = by; |
| @@ -729,29 +812,91 @@ |
| by = (byte) c; |
| b[11] = by; |
| os.write(b); |
| + |
| +//System.out.println("size: " + size + " length: " + length + " text: " + text); |
| |
| |
| if (text != null) |
| { |
| - byte byteArray[] = text.getBytes(); |
| - byte byteArray2[] = new byte[byteArray.length + 1]; |
| - for (int i = 0; i < byteArray.length; i++) { |
| - byteArray2[i] = byteArray[i]; |
| + os.write(byteArray); |
| + } |
| + } |
| + |
| + int max_char(String text) { |
| + int maxc = 0; |
| + char chars[] = text.toCharArray(); |
| + for (int n = 0; n < chars.length; n++) { |
| + if ((int) chars[n] > maxc) { |
| + maxc = (int) chars[n]; |
| } |
| - byteArray2[byteArray2.length - 1] = 0; |
| - os.write(byteArray2); |
| } |
| - |
| + return maxc; |
| } |
| |
| + String guess_encoding(char[] chars) { |
| + boolean saw_high_char = false; |
| + |
| + for (int i = 0; i < chars.length; i++) { |
| + if (chars[i] == '\0') { |
| + break; |
| + } |
| + if (chars[i] >= 128) { |
| + saw_high_char = true; |
| + break; |
| + } |
| + } |
| + if (!saw_high_char) { |
| + return "ASCII"; |
| + } |
| + char prev = 1; |
| + boolean valid_utf8 = true; |
| + int n = 0; |
| + for (int i = 0; i < chars.length; i++) { |
| + if (chars[i] == '\0') { |
| + break; |
| + } |
| + char c = chars[i]; |
| + if (prev < 128 && c >= 128) { |
| + if (c >> 5 == 0x6) { |
| + n = 1; |
| + } else if (c >> 4 == 0xe) { |
| + n = 2; |
| + } else if (c >> 3 == 0x1e) { |
| + n = 3; |
| + } else if (c >> 2 == 0x3e) { |
| + n = 4; |
| + } else { |
| + valid_utf8 = false; |
| + break; |
| + } |
| + } else { |
| + if (n > 0) { |
| + if (c < 128) { |
| + valid_utf8 = false; |
| + break; |
| + } |
| + n--; |
| + } |
| + } |
| + |
| + prev = c; |
| + } |
| + if (valid_utf8) { |
| + return "UTF-8"; |
| + } else { |
| + return "ISO-8859-1"; |
| + } |
| + } |
| + |
| + |
| //Internally used. Write an rfb message to the server for sending files ONLY |
| int writeRfbFileTransferMsgForSendFile( |
| - int contentType, |
| - int contentParam, |
| - long size, |
| - long length, |
| - String source |
| - ) throws IOException |
| + int contentType, |
| + int contentParam, |
| + long size, |
| + long length, |
| + String source |
| + ) throws IOException |
| { |
| File f = new File(source); |
| fis = new FileInputStream(f); |
| @@ -768,50 +913,47 @@ |
| |
| while (bytesRead!=-1) |
| { |
| - counter += bytesRead; |
| - myDeflater.setInput(byteBuffer, 0, bytesRead); |
| - myDeflater.finish(); |
| - compressedSize = myDeflater.deflate(CompressionBuffer); |
| - myDeflater.reset(); |
| - // If the compressed data is larger than the original one, we're dealing with |
| - // already compressed data |
| - if (compressedSize > bytesRead) |
| - fCompress = false; |
| - this.writeRfbFileTransferMsg( |
| - contentType, |
| - contentParam, |
| - (fCompress ? 1 : 0), |
| - (fCompress ? compressedSize-1 : bytesRead-1), |
| - null |
| - ); |
| - // Todo: Test write error ! |
| - os.write( |
| - fCompress ? CompressionBuffer : byteBuffer, |
| - 0, |
| - fCompress ? compressedSize : bytesRead |
| - ); |
| - |
| - // Todo: test read error ! |
| - bytesRead = fis.read(byteBuffer); |
| - |
| - // viewer.ftp.connectionStatus.setText("Sent: "+ counter + " bytes of "+ f.length() + " bytes"); |
| - viewer.ftp.jProgressBar.setValue((int)((counter * 100) / f.length())); |
| - viewer.ftp.connectionStatus.setText(">>> Sending File: " + source + " - Size: " + f.length() + " bytes - Progress: " + ((counter * 100) / f.length()) + "%"); |
| - |
| - if (fAbort == true) |
| - { |
| - fAbort = false; |
| - fError = true; |
| - break; |
| - } |
| - try |
| - { |
| - Thread.sleep(5); |
| - } |
| - catch(InterruptedException e) |
| - { |
| - System.err.println("Interrupted"); |
| - } |
| + counter += bytesRead; |
| + myDeflater.setInput(byteBuffer, 0, bytesRead); |
| + myDeflater.finish(); |
| + compressedSize = myDeflater.deflate(CompressionBuffer); |
| + myDeflater.reset(); |
| + // If the compressed data is larger than the original one, we're dealing with |
| + // already compressed data |
| + if (compressedSize > bytesRead) |
| + fCompress = false; |
| + this.writeRfbFileTransferMsg( |
| + contentType, |
| + contentParam, |
| + (fCompress ? 1 : 0), |
| +// RUNGE (fCompress ? compressedSize-1 : bytesRead-1), |
| + (fCompress ? compressedSize : bytesRead), |
| + null |
| + ); |
| + // Todo: Test write error ! |
| + os.write(fCompress ? CompressionBuffer : byteBuffer, 0, fCompress ? compressedSize : bytesRead); |
| + |
| + // Todo: test read error ! |
| + bytesRead = fis.read(byteBuffer); |
| + |
| + // viewer.ftp.connectionStatus.setText("Sent: "+ counter + " bytes of "+ f.length() + " bytes"); |
| + viewer.ftp.jProgressBar.setValue((int)((counter * 100) / f.length())); |
| + viewer.ftp.connectionStatus.setText(">>> Sending File: " + source + " - Size: " + f.length() + " bytes - Progress: " + ((counter * 100) / f.length()) + "%"); |
| + |
| + if (fAbort == true) |
| + { |
| + fAbort = false; |
| + fError = true; |
| + break; |
| + } |
| + try |
| + { |
| + Thread.sleep(5); |
| + } |
| + catch(InterruptedException e) |
| + { |
| + System.err.println("Interrupted"); |
| + } |
| } |
| |
| writeRfbFileTransferMsg(fError ? rfbAbortFileTransfer : rfbEndOfFile, 0, 0, 0, null); |
| @@ -831,24 +973,30 @@ |
| { |
| System.out.print((char) is.readUnsignedByte()); |
| } |
| + System.out.println(""); |
| + |
| + if (size == rfbRErrorCmd || size == -1) { |
| + viewer.ftp.enableButtons(); |
| + viewer.ftp.connectionStatus.setText("Remote file not available for writing."); |
| + viewer.ftp.historyComboBox.insertItemAt(new String(" > Error - Remote file not available for writing."), 0); |
| + viewer.ftp.historyComboBox.setSelectedIndex(0); |
| + return; |
| + } |
| |
| - int ret = writeRfbFileTransferMsgForSendFile( |
| - rfbFilePacket, |
| - 0, |
| - 0, |
| - 0, |
| - sendFileSource); |
| + int ret = writeRfbFileTransferMsgForSendFile(rfbFilePacket, 0, 0, 0, sendFileSource); |
| |
| viewer.ftp.refreshRemoteLocation(); |
| if (ret != 1) |
| { |
| viewer.ftp.connectionStatus.setText(" > Error - File NOT sent"); |
| - viewer.ftp.historyComboBox.insertItemAt(new String(" > Error - File: <" + sendFileSource) + "> was not correctly sent (aborted by user or error)",0); |
| + viewer.ftp.historyComboBox.insertItemAt(new String(" > Error - File: <" + sendFileSource) |
| + + "> was not correctly sent (aborted or error). Data may still be buffered/in transit. Wait for remote listing...",0); |
| } |
| else |
| { |
| viewer.ftp.connectionStatus.setText(" > File sent"); |
| - viewer.ftp.historyComboBox.insertItemAt(new String(" > File: <" + sendFileSource) + "> was sent to Remote Machine",0); |
| + viewer.ftp.historyComboBox.insertItemAt(new String(" > File: <" + sendFileSource) |
| + + "> was sent to Remote Machine. Note: data may still be buffered/in transit. Wait for remote listing...",0); |
| } |
| viewer.ftp.historyComboBox.setSelectedIndex(0); |
| viewer.ftp.enableButtons(); |
| @@ -907,7 +1055,7 @@ |
| //Handles acknowledgement that the file has been deleted on the server |
| void deleteRemoteFileFeedback() throws IOException |
| { |
| - is.readInt(); |
| + int ret = is.readInt(); |
| int length = is.readInt(); |
| String f = ""; |
| for (int i = 0; i < length; i++) |
| @@ -916,7 +1064,11 @@ |
| } |
| |
| viewer.ftp.refreshRemoteLocation(); |
| - viewer.ftp.historyComboBox.insertItemAt(new String(" > Deleted File On Remote Machine: " + f.substring(0, f.length()-1)),0); |
| + if (ret == -1) { |
| + viewer.ftp.historyComboBox.insertItemAt(new String(" > ERROR Could not Delete File On Remote Machine: "),0); |
| + } else { |
| + viewer.ftp.historyComboBox.insertItemAt(new String(" > Deleted File On Remote Machine: " + f.substring(0, f.length()-1)),0); |
| + } |
| viewer.ftp.historyComboBox.setSelectedIndex(0); |
| } |
| |
| @@ -926,12 +1078,7 @@ |
| try |
| { |
| String temp = text; |
| - writeRfbFileTransferMsg( |
| - rfbCommand, |
| - rfbCFileDelete, |
| - 0, |
| - temp.length(), |
| - temp); |
| + writeRfbFileTransferMsg(rfbCommand, rfbCFileDelete, 0, temp.length(), temp); |
| } |
| catch (IOException e) |
| { |
| @@ -943,7 +1090,7 @@ |
| // Handles acknowledgement that the directory has been created on the server |
| void createRemoteDirectoryFeedback() throws IOException |
| { |
| - is.readInt(); |
| + int ret = is.readInt(); |
| int length = is.readInt(); |
| String f=""; |
| for (int i = 0; i < length; i++) |
| @@ -951,7 +1098,11 @@ |
| f += (char)is.readUnsignedByte(); |
| } |
| viewer.ftp.refreshRemoteLocation(); |
| - viewer.ftp.historyComboBox.insertItemAt(new String(" > Created Directory on Remote Machine: " + f.substring(0, f.length()-1)),0); |
| + if (ret == -1) { |
| + viewer.ftp.historyComboBox.insertItemAt(new String(" > ERROR Could not Create Directory on Remote Machine."),0); |
| + } else { |
| + viewer.ftp.historyComboBox.insertItemAt(new String(" > Created Directory on Remote Machine: " + f.substring(0, f.length()-1)),0); |
| + } |
| viewer.ftp.historyComboBox.setSelectedIndex(0); |
| } |
| |
| @@ -961,12 +1112,7 @@ |
| try |
| { |
| String temp = text; |
| - writeRfbFileTransferMsg( |
| - rfbCommand, |
| - rfbCDirCreate, |
| - 0, |
| - temp.length(), |
| - temp); |
| + writeRfbFileTransferMsg(rfbCommand, rfbCDirCreate, 0, temp.length(), temp); |
| } |
| catch (IOException e) |
| { |
| @@ -979,15 +1125,13 @@ |
| { |
| try |
| { |
| +//System.out.println("requestRemoteFile text: " + text); |
| +//System.out.println("requestRemoteFile leng: " + text.length()); |
| String temp = text; |
| receivePath = localPath; |
| |
| - writeRfbFileTransferMsg( |
| - rfbFileTransferRequest, |
| - 0, |
| - 1, // 0 : compression not supported - 1 : compression supported |
| - temp.length(), |
| - temp); |
| + // 0 : compression not supported - 1 : compression supported |
| + writeRfbFileTransferMsg(rfbFileTransferRequest, 0, 1, temp.length(), temp); |
| } |
| catch (IOException e) |
| { |
| @@ -1004,6 +1148,9 @@ |
| viewer.ftp.disableButtons(); |
| int size = is.readInt(); |
| int length = is.readInt(); |
| + |
| +//System.out.println("receiveFileHeader size: " + size); |
| +//System.out.println("receiveFileHeader leng: " + length); |
| |
| String tempName = ""; |
| for (int i = 0; i < length; i++) |
| @@ -1011,6 +1158,15 @@ |
| tempName += (char) is.readUnsignedByte(); |
| } |
| |
| + if (size == rfbRErrorCmd || size == -1) { |
| + fFileReceptionRunning = false; |
| + viewer.ftp.enableButtons(); |
| + viewer.ftp.connectionStatus.setText("Remote file not available for reading."); |
| + viewer.ftp.historyComboBox.insertItemAt(new String(" > Error - Remote file not available for reading."), 0); |
| + viewer.ftp.historyComboBox.setSelectedIndex(0); |
| + return; |
| + } |
| + |
| // sf@2004 - Read the high part of file size (not yet in rfbFileTransferMsg for |
| // backward compatibility reasons...) |
| int sizeH = is.readInt(); |
| @@ -1021,7 +1177,16 @@ |
| fileSize=0; |
| fileChunkCounter = 0; |
| String fileName = receivePath; |
| - fos = new FileOutputStream(fileName); |
| + try { |
| + fos = new FileOutputStream(fileName); |
| + } catch (Exception e) { |
| + fFileReceptionRunning = false; |
| + writeRfbFileTransferMsg(rfbAbortFileTransfer, 0, 0, 0, null); |
| + viewer.ftp.historyComboBox.insertItemAt(new String(" > ERROR opening Local File: <" + fileName ),0); |
| + viewer.ftp.historyComboBox.setSelectedIndex(0); |
| + viewer.ftp.enableButtons(); |
| + return; |
| + } |
| writeRfbFileTransferMsg(rfbFileHeader, 0, 0, 0, null); |
| } |
| |
| @@ -1085,7 +1250,13 @@ |
| fAbort = false; |
| fFileReceptionError = true; |
| writeRfbFileTransferMsg(rfbAbortFileTransfer, 0, 0, 0, null); |
| - |
| + |
| + //runge for use with x11vnc/libvncserver, no rfbAbortFileTransfer reply sent. |
| + try {Thread.sleep(500);} catch (InterruptedException e) {} |
| + viewer.ftp.enableButtons(); |
| + viewer.ftp.refreshLocalLocation(); |
| + viewer.ftp.connectionStatus.setText(" > Error - File NOT received"); |
| + viewer.ftp.historyComboBox.insertItemAt(new String(" > Error - File: <" + receivePath + "> not correctly received from Remote Machine (aborted by user or error)") ,0); |
| } |
| // sf@2004 - For old FT protocole only |
| /* |
| @@ -1104,7 +1275,7 @@ |
| int length = is.readInt(); |
| fileSize=0; |
| fos.close(); |
| - |
| + |
| viewer.ftp.refreshLocalLocation(); |
| if (fReceptionOk && !fFileReceptionError) |
| { |
| @@ -1132,12 +1303,7 @@ |
| try |
| { |
| String temp = text; |
| - writeRfbFileTransferMsg( |
| - rfbDirContentRequest, |
| - rfbRDirContent, |
| - 0, |
| - temp.length(), |
| - temp); |
| + writeRfbFileTransferMsg(rfbDirContentRequest, rfbRDirContent, 0, temp.length(), temp); |
| } |
| catch (IOException e) |
| { |
| @@ -1197,11 +1363,80 @@ |
| str += temp; |
| } |
| } |
| + // runge |
| + viewer.ftp.receivedRemoteDirectoryName(str); |
| // viewer.ftp.changeRemoteDirectory(str); |
| |
| } |
| } |
| |
| + int zogswap(int n) { |
| + long l = n; |
| + if (l < 0) { |
| + l += 0x100000000L; |
| + } |
| + l = l & 0xFFFFFFFF; |
| + l = (l >> 24) | ((l & 0x00ff0000) >> 8) | ((l & 0x0000ff00) << 8) | (l << 24); |
| + return (int) l; |
| + } |
| + |
| + int windozeToUnix(int L, int H) { |
| + long L2 = zogswap(L); |
| + long H2 = zogswap(H); |
| + long unix = (H2 << 32) + L2; |
| + unix -= 11644473600L * 10000000L; |
| + unix /= 10000000L; |
| + //System.out.println("unix time: " + unix + " H2: " + H2 + " L2: " + L2); |
| + return (int) unix; |
| + } |
| + |
| + String timeStr(int t, int h) { |
| + if (h == 0) { |
| + // x11vnc/libvncserver unix |
| + t = zogswap(t); |
| + } else { |
| + // ultra (except if h==0 by chance) |
| + t = windozeToUnix(t, h); |
| + } |
| + long tl = (long) t; |
| + Date date = new Date(tl * 1000); |
| + if (true) { |
| + return date.toString(); |
| + } else { |
| + return DateFormat.getDateTimeInstance().format(date); |
| + } |
| + } |
| + |
| + String dotPast(double f, int n) { |
| + String fs = "" + f; |
| + int i = fs.lastIndexOf(".") + n; |
| + if (i >= 0) { |
| + int len = fs.length(); |
| + if (i >= len) { |
| + i = len-1; |
| + } |
| + fs = fs.substring(0, i); |
| + } |
| + return fs; |
| + } |
| + String sizeStr(int s) { |
| + s = zogswap(s); |
| + if (s < 0) { |
| + return s + "? B"; |
| + } else if (s < 1024) { |
| + return s + " B"; |
| + } else if (s < 1024 * 1024) { |
| + double k = s / 1024.0; |
| + String ks = dotPast(k, 3); |
| + |
| + return s + " (" + ks + " KB)"; |
| + } else { |
| + double m = s / (1024.0*1024.0); |
| + String ms = dotPast(m, 3); |
| + return s + " (" + ms + " MB)"; |
| + } |
| + } |
| + |
| //Internally used to receive directory content from server |
| //Here, the server sends one file/directory with it's attributes |
| void readFTPMsgDirectoryListContent() throws IOException |
| @@ -1217,17 +1452,32 @@ |
| dwReserved0, |
| dwReserved1; |
| long ftCreationTime, ftLastAccessTime, ftLastWriteTime; |
| + int ftCreationTimeL, ftLastAccessTimeL, ftLastWriteTimeL; |
| + int ftCreationTimeH, ftLastAccessTimeH, ftLastWriteTimeH; |
| char cFileName, cAlternateFileName; |
| int length = 0; |
| is.readInt(); |
| length = is.readInt(); |
| + |
| + char[] chars = new char[4*length]; |
| + int char_cnt = 0; |
| + for (int i = 0; i < chars.length; i++) { |
| + chars[i] = '\0'; |
| + } |
| + |
| dwFileAttributes = is.readInt(); |
| length -= 4; |
| - ftCreationTime = is.readLong(); |
| + //ftCreationTime = is.readLong(); |
| + ftCreationTimeL = is.readInt(); |
| + ftCreationTimeH = is.readInt(); |
| length -= 8; |
| - ftLastAccessTime = is.readLong(); |
| + //ftLastAccessTime = is.readLong(); |
| + ftLastAccessTimeL = is.readInt(); |
| + ftLastAccessTimeH = is.readInt(); |
| length -= 8; |
| - ftLastWriteTime = is.readLong(); |
| + //ftLastWriteTime = is.readLong(); |
| + ftLastWriteTimeL = is.readInt(); |
| + ftLastWriteTimeH = is.readInt(); |
| length -= 8; |
| nFileSizeHigh = is.readInt(); |
| length -= 4; |
| @@ -1239,10 +1489,12 @@ |
| length -= 4; |
| cFileName = (char) is.readUnsignedByte(); |
| length--; |
| + chars[char_cnt++] = cFileName; |
| while (cFileName != '\0') |
| { |
| fileName += cFileName; |
| cFileName = (char) is.readUnsignedByte(); |
| + chars[char_cnt++] = cFileName; |
| length--; |
| } |
| cAlternateFileName = (char) is.readByte(); |
| @@ -1253,7 +1505,28 @@ |
| cAlternateFileName = (char) is.readUnsignedByte(); |
| length--; |
| } |
| - if (dwFileAttributes == 268435456 |
| + String guessed = guess_encoding(chars); |
| + if (!guessed.equals("ASCII")) { |
| + System.out.println("guess: " + guessed + "\t" + fileName); |
| + } |
| + if (guessed.equals("UTF-8")) { |
| + try { |
| + byte[] bytes = new byte[char_cnt-1]; |
| + for (int i=0; i < char_cnt-1; i++) { |
| + bytes[i] = (byte) chars[i]; |
| + } |
| + String newstr = new String(bytes, "UTF-8"); |
| + fileName = newstr; |
| + } catch (Exception e) { |
| + System.out.println("failed to convert bytes to UTF-8 based string"); |
| + } |
| + } |
| + for (int i = 0; i < char_cnt; i++) { |
| + //System.out.println("char[" + i + "]\t" + (int) chars[i]); |
| + } |
| + if (fileName.length() <= 0) { |
| + ; |
| + } else if (dwFileAttributes == 268435456 |
| || dwFileAttributes == 369098752 |
| || dwFileAttributes == 285212672 |
| || dwFileAttributes == 271056896 |
| @@ -1263,11 +1536,74 @@ |
| || dwFileAttributes == 369623040) |
| { |
| fileName = " [" + fileName + "]"; |
| - remoteDirsList.add(fileName); // sf@2004 |
| - } |
| - else |
| - { |
| - remoteFilesList.add(" " + fileName); // sf@2004 |
| +// begin runge/x11vnc |
| +// remoteDirsList.add(fileName); // sf@2004 |
| + int i = -1; |
| + String t1 = fileName.toLowerCase(); |
| + for (int j = 0; j < remoteDirsList.size(); j++) { |
| + String t = (String) remoteDirsList.get(j); |
| + String t2 = t.toLowerCase(); |
| + if (t1.compareTo(t2) < 0) { |
| + i = j; |
| + break; |
| + } |
| + } |
| + //String s = "Lastmod: " + timeStr(ftLastWriteTimeL, ftLastWriteTimeH) + " " + fileName; |
| + String f2 = fileName; |
| + if (f2.length() < 24) { |
| + for (int ik = f2.length(); ik < 24; ik++) { |
| + f2 = f2 + " "; |
| + } |
| + } |
| + String s = f2 + " \tLastmod: " + timeStr(ftLastWriteTimeL, ftLastWriteTimeH) + " \t\tSize: " + sizeStr(nFileSizeLow); |
| + //s = fileName + " Lastmod: " + zogswap(ftLastWriteTimeL); |
| + if (i >= 0) { |
| + remoteDirsList.add(i, fileName); |
| + remoteDirsListInfo.add(i, s); |
| + } else { |
| + remoteDirsList.add(fileName); |
| + remoteDirsListInfo.add(s); |
| + } |
| +// end runge/x11vnc |
| + } else { |
| +// begin runge/x11vnc |
| +// remoteFilesList.add(" " + fileName); // sf@2004 |
| + |
| + fileName = " " + fileName; |
| + int i = -1; |
| + String t1 = fileName.toLowerCase(); |
| + for (int j = 0; j < remoteFilesList.size(); j++) { |
| + String t = (String) remoteFilesList.get(j); |
| + String t2 = t.toLowerCase(); |
| + if (t1.compareTo(t2) < 0) { |
| + i = j; |
| + break; |
| + } |
| + } |
| + String f2 = fileName; |
| + if (f2.length() < 24) { |
| + for (int ik = f2.length(); ik < 24; ik++) { |
| + f2 = f2 + " "; |
| + } |
| + } |
| + |
| +if (false) { |
| +System.out.println("fileName: " + f2); |
| +System.out.println("ftLastWriteTimeL: " + ftLastWriteTimeL); |
| +System.out.println("ftLastWriteTimeH: " + ftLastWriteTimeH); |
| +System.out.println("nFileSizeLow: " + nFileSizeLow); |
| +} |
| + |
| + String s = f2 + " \tLastmod: " + timeStr(ftLastWriteTimeL, ftLastWriteTimeH) + " \t\tSize: " + sizeStr(nFileSizeLow); |
| + //s = fileName + " Lastmod: " + ftLastWriteTimeL + "/" + zogswap(ftLastWriteTimeL) + " Size: " + nFileSizeLow + "/" + zogswap(nFileSizeLow); |
| + if (i >= 0) { |
| + remoteFilesList.add(i, fileName); |
| + remoteFilesListInfo.add(i, s); |
| + } else { |
| + remoteFilesList.add(fileName); |
| + remoteFilesListInfo.add(s); |
| + } |
| +// end runge/x11vnc |
| } |
| |
| // a.add(fileName); |
| @@ -1282,14 +1618,32 @@ |
| |
| // sf@2004 |
| a.clear(); |
| - for (int i = 0; i < remoteDirsList.size(); i++) |
| + b.clear(); |
| + for (int i = 0; i < remoteDirsList.size(); i++) { |
| a.add(remoteDirsList.get(i)); |
| - for (int i = 0; i < remoteFilesList.size(); i++) |
| + b.add(remoteDirsListInfo.get(i)); |
| + } |
| + for (int i = 0; i < remoteFilesList.size(); i++) { |
| a.add(remoteFilesList.get(i)); |
| + |
| + b.add(remoteFilesListInfo.get(i)); |
| + } |
| remoteDirsList.clear(); |
| + remoteDirsListInfo.clear(); |
| remoteFilesList.clear(); |
| + remoteFilesListInfo.clear(); |
| |
| - viewer.ftp.printDirectory(a); |
| +// begin runge/x11vnc |
| + // Hack for double listing at startup... probably libvncserver bug.. |
| + readServerDriveListCnt++; |
| + if (readServerDriveListCnt == 2) { |
| + if (System.currentTimeMillis() - readServerDriveListTime < 2000) { |
| +//System.out.println("readServerDriveListCnt skip " + readServerDriveListCnt); |
| + return; |
| + } |
| + } |
| +// end runge/x11vnc |
| + viewer.ftp.printDirectory(a, b); |
| } |
| |
| //Internally used to signify the drive requested is not ready |
| @@ -1299,6 +1653,8 @@ |
| System.out.println("Remote Drive unavailable"); |
| viewer.ftp.connectionStatus.setText(" > WARNING - Remote Drive unavailable (possibly restricted access or media not present)"); |
| viewer.ftp.remoteStatus.setText("WARNING: Remote Drive unavailable"); |
| + viewer.ftp.historyComboBox.insertItemAt(new String(" > WARNING: Remote Drive unavailable."), 0); |
| + viewer.ftp.historyComboBox.setSelectedIndex(0); |
| } |
| |
| //Call this method to request the list of drives on the server. |
| @@ -1306,12 +1662,11 @@ |
| { |
| try |
| { |
| - viewer.rfb.writeRfbFileTransferMsg( |
| - RfbProto.rfbDirContentRequest, |
| - RfbProto.rfbRDrivesList, |
| - 0, |
| - 0, |
| - null); |
| + viewer.rfb.writeRfbFileTransferMsg(RfbProto.rfbDirContentRequest, RfbProto.rfbRDrivesList, 0, 0, null); |
| +// begin runge/x11vnc |
| + readServerDriveListCnt = 0; |
| + readServerDriveListTime = System.currentTimeMillis(); |
| +// end runge/x11vnc |
| } |
| catch (IOException e) |
| { |
| @@ -1355,21 +1710,21 @@ |
| int h, |
| boolean incremental) |
| throws IOException { |
| - if (!viewer.ftp.isVisible()) { |
| - byte[] b = new byte[10]; |
| + if (!viewer.ftp.isVisible()) { |
| + byte[] b = new byte[10]; |
| |
| - b[0] = (byte) FramebufferUpdateRequest; |
| - b[1] = (byte) (incremental ? 1 : 0); |
| - b[2] = (byte) ((x >> 8) & 0xff); |
| - b[3] = (byte) (x & 0xff); |
| - b[4] = (byte) ((y >> 8) & 0xff); |
| - b[5] = (byte) (y & 0xff); |
| - b[6] = (byte) ((w >> 8) & 0xff); |
| - b[7] = (byte) (w & 0xff); |
| - b[8] = (byte) ((h >> 8) & 0xff); |
| - b[9] = (byte) (h & 0xff); |
| + b[0] = (byte) FramebufferUpdateRequest; |
| + b[1] = (byte) (incremental ? 1 : 0); |
| + b[2] = (byte) ((x >> 8) & 0xff); |
| + b[3] = (byte) (x & 0xff); |
| + b[4] = (byte) ((y >> 8) & 0xff); |
| + b[5] = (byte) (y & 0xff); |
| + b[6] = (byte) ((w >> 8) & 0xff); |
| + b[7] = (byte) (w & 0xff); |
| + b[8] = (byte) ((h >> 8) & 0xff); |
| + b[9] = (byte) (h & 0xff); |
| |
| - os.write(b); |
| + os.write(b); |
| } |
| } |
| |
| @@ -1482,7 +1837,13 @@ |
| b[6] = (byte) ((text.length() >> 8) & 0xff); |
| b[7] = (byte) (text.length() & 0xff); |
| |
| - System.arraycopy(text.getBytes(), 0, b, 8, text.length()); |
| + if (false && max_char(text) > 255) { |
| + System.arraycopy(text.getBytes("UTF-8"), 0, b, 8, text.length()); |
| + } else if (max_char(text) > 127) { |
| + System.arraycopy(text.getBytes("ISO-8859-1"), 0, b, 8, text.length()); |
| + } else { |
| + System.arraycopy(text.getBytes(), 0, b, 8, text.length()); |
| + } |
| |
| os.write(b); |
| // } |
| @@ -1506,6 +1867,37 @@ |
| final static int META_MASK = InputEvent.META_MASK; |
| final static int ALT_MASK = InputEvent.ALT_MASK; |
| |
| + void writeWheelEvent(MouseWheelEvent evt) throws IOException { |
| + eventBufLen = 0; |
| + |
| + int x = evt.getX(); |
| + int y = evt.getY(); |
| + |
| + if (x < 0) x = 0; |
| + if (y < 0) y = 0; |
| + |
| + int ptrmask; |
| + |
| + int clicks = evt.getWheelRotation(); |
| + System.out.println("writeWheelEvent: clicks: " + clicks); |
| + if (clicks > 0) { |
| + ptrmask = 16; |
| + } else if (clicks < 0) { |
| + ptrmask = 8; |
| + } else { |
| + return; |
| + } |
| + |
| + eventBuf[eventBufLen++] = (byte) PointerEvent; |
| + eventBuf[eventBufLen++] = (byte) ptrmask; |
| + eventBuf[eventBufLen++] = (byte) ((x >> 8) & 0xff); |
| + eventBuf[eventBufLen++] = (byte) (x & 0xff); |
| + eventBuf[eventBufLen++] = (byte) ((y >> 8) & 0xff); |
| + eventBuf[eventBufLen++] = (byte) (y & 0xff); |
| + |
| + os.write(eventBuf, 0, eventBufLen); |
| + } |
| + |
| // |
| // Write a pointer event message. We may need to send modifier key events |
| // around it to set the correct modifier state. |
| @@ -1610,6 +2002,21 @@ |
| |
| boolean down = (evt.getID() == KeyEvent.KEY_PRESSED); |
| |
| + if (viewer.debugKeyboard) { |
| + System.out.println("----------------------------------------"); |
| + System.out.println("evt.getKeyChar: " + evt.getKeyChar()); |
| + System.out.println("getKeyText: " + KeyEvent.getKeyText(evt.getKeyCode())); |
| + System.out.println("evt.getKeyCode: " + evt.getKeyCode()); |
| + System.out.println("evt.getID: " + evt.getID()); |
| + System.out.println("evt.getKeyLocation: " + evt.getKeyLocation()); |
| + System.out.println("evt.isActionKey: " + evt.isActionKey()); |
| + System.out.println("evt.isControlDown: " + evt.isControlDown()); |
| + System.out.println("evt.getModifiers: " + evt.getModifiers()); |
| + System.out.println("getKeyModifiersText: " + KeyEvent.getKeyModifiersText(evt.getModifiers())); |
| + System.out.println("evt.paramString: " + evt.paramString()); |
| + } |
| + |
| + |
| int key; |
| if (evt.isActionKey()) { |
| |
| @@ -1685,6 +2092,9 @@ |
| default : |
| return; |
| } |
| + if (key == 0xffc2 && viewer.mapF5_to_atsign) { |
| + key = 0x40; |
| + } |
| |
| } else { |
| |
| @@ -1794,6 +2204,16 @@ |
| int oldModifiers = 0; |
| |
| void writeModifierKeyEvents(int newModifiers) { |
| + if(viewer.forbid_Ctrl_Alt) { |
| + if ((newModifiers & CTRL_MASK) != 0 && (newModifiers & ALT_MASK) != 0) { |
| + int orig = newModifiers; |
| + newModifiers &= ~ALT_MASK; |
| + newModifiers &= ~CTRL_MASK; |
| + if (viewer.debugKeyboard) { |
| + System.out.println("Ctrl+Alt modifiers: " + orig + " -> " + newModifiers); |
| + } |
| + } |
| + } |
| if ((newModifiers & CTRL_MASK) != (oldModifiers & CTRL_MASK)) |
| writeKeyEvent(0xffe3, (newModifiers & CTRL_MASK) != 0); |
| |
| diff -Naur JavaViewer.orig/SSLSocketToMe.java JavaViewer/SSLSocketToMe.java |
| --- JavaViewer.orig/SSLSocketToMe.java 1969-12-31 19:00:00.000000000 -0500 |
| +++ JavaViewer/SSLSocketToMe.java 2010-07-10 19:18:06.000000000 -0400 |
| @@ -0,0 +1,2067 @@ |
| +/* |
| + * SSLSocketToMe.java: add SSL encryption to Java VNC Viewer. |
| + * |
| + * Copyright (c) 2006 Karl J. Runge <[email protected]> |
| + * All rights reserved. |
| + * |
| + * This is free software; you can redistribute it and/or modify |
| + * it under the terms of the GNU General Public License as published by |
| + * the Free Software Foundation; version 2 of the License, or |
| + * (at your option) any later version. |
| + * |
| + * This software is distributed in the hope that it will be useful, |
| + * but WITHOUT ANY WARRANTY; without even the implied warranty of |
| + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
| + * GNU General Public License for more details. |
| + * |
| + * You should have received a copy of the GNU General Public License |
| + * along with this software; if not, write to the Free Software |
| + * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, |
| + * USA. |
| + * |
| + */ |
| + |
| +import java.net.*; |
| +import java.io.*; |
| +import javax.net.ssl.*; |
| +import java.util.*; |
| + |
| +import java.security.*; |
| +import java.security.cert.*; |
| +import java.security.spec.*; |
| +import java.security.cert.Certificate; |
| +import java.security.cert.CertificateFactory; |
| + |
| +import java.awt.*; |
| +import java.awt.event.*; |
| + |
| +public class SSLSocketToMe { |
| + |
| + /* basic member data: */ |
| + String host; |
| + int port; |
| + VncViewer viewer; |
| + |
| + boolean debug = true; |
| + boolean debug_certs = false; |
| + |
| + /* sockets */ |
| + SSLSocket socket = null; |
| + SSLSocketFactory factory; |
| + |
| + /* fallback for Proxy connection */ |
| + boolean proxy_in_use = false; |
| + boolean proxy_failure = false; |
| + public DataInputStream is = null; |
| + public OutputStream os = null; |
| + |
| + /* strings from user WRT proxy: */ |
| + String proxy_auth_string = null; |
| + String proxy_dialog_host = null; |
| + int proxy_dialog_port = 0; |
| + |
| + Socket proxySock; |
| + DataInputStream proxy_is; |
| + OutputStream proxy_os; |
| + |
| + /* trust contexts */ |
| + SSLContext trustloc_ctx; |
| + SSLContext trustall_ctx; |
| + SSLContext trustsrv_ctx; |
| + SSLContext trusturl_ctx; |
| + SSLContext trustone_ctx; |
| + |
| + /* corresponding trust managers */ |
| + TrustManager[] trustAllCerts; |
| + TrustManager[] trustSrvCert; |
| + TrustManager[] trustUrlCert; |
| + TrustManager[] trustOneCert; |
| + |
| + /* client-side SSL auth key (oneTimeKey=...) */ |
| + KeyManager[] mykey = null; |
| + |
| + boolean user_wants_to_see_cert = true; |
| + String cert_fail = null; |
| + |
| + /* cert(s) we retrieve from Web server, VNC server, or serverCert param: */ |
| + java.security.cert.Certificate[] trustallCerts = null; |
| + java.security.cert.Certificate[] trustsrvCerts = null; |
| + java.security.cert.Certificate[] trusturlCerts = null; |
| + |
| + /* utility to decode hex oneTimeKey=... and serverCert=... */ |
| + byte[] hex2bytes(String s) { |
| + byte[] bytes = new byte[s.length()/2]; |
| + for (int i=0; i<s.length()/2; i++) { |
| + int j = 2*i; |
| + try { |
| + int val = Integer.parseInt(s.substring(j, j+2), 16); |
| + if (val > 127) { |
| + val -= 256; |
| + } |
| + Integer I = new Integer(val); |
| + bytes[i] = Byte.decode(I.toString()).byteValue(); |
| + |
| + } catch (Exception e) { |
| + ; |
| + } |
| + } |
| + return bytes; |
| + } |
| + |
| + SSLSocketToMe(String h, int p, VncViewer v) throws Exception { |
| + host = h; |
| + port = p; |
| + viewer = v; |
| + |
| + debug_certs = v.debugCerts; |
| + |
| + /* we will first try default factory for certification: */ |
| + |
| + factory = (SSLSocketFactory) SSLSocketFactory.getDefault(); |
| + |
| + dbg("SSL startup: " + host + " " + port); |
| + |
| + |
| + /* create trust managers to be used if initial handshake fails: */ |
| + |
| + trustAllCerts = new TrustManager[] { |
| + /* |
| + * this one accepts everything. Only used if user |
| + * has disabled checking (trustAllVncCerts=yes) |
| + * or when we grab the cert to show it to them in |
| + * a dialog and ask them to manually verify/accept it. |
| + */ |
| + new X509TrustManager() { |
| + public java.security.cert.X509Certificate[] |
| + getAcceptedIssuers() { |
| + return null; |
| + } |
| + public void checkClientTrusted( |
| + java.security.cert.X509Certificate[] certs, |
| + String authType) { |
| + /* empty */ |
| + } |
| + public void checkServerTrusted( |
| + java.security.cert.X509Certificate[] certs, |
| + String authType) { |
| + /* empty */ |
| + dbg("ALL: an untrusted connect to grab cert."); |
| + } |
| + } |
| + }; |
| + |
| + trustUrlCert = new TrustManager[] { |
| + /* |
| + * this one accepts only the retrieved server |
| + * cert by SSLSocket by this applet and stored in |
| + * trusturlCerts. |
| + */ |
| + new X509TrustManager() { |
| + public java.security.cert.X509Certificate[] |
| + getAcceptedIssuers() { |
| + return null; |
| + } |
| + public void checkClientTrusted( |
| + java.security.cert.X509Certificate[] certs, |
| + String authType) throws CertificateException { |
| + throw new CertificateException("No Clients (URL)"); |
| + } |
| + public void checkServerTrusted( |
| + java.security.cert.X509Certificate[] certs, |
| + String authType) throws CertificateException { |
| + /* we want to check 'certs' against 'trusturlCerts' */ |
| + if (trusturlCerts == null) { |
| + throw new CertificateException( |
| + "No Trust url Certs array."); |
| + } |
| + if (trusturlCerts.length < 1) { |
| + throw new CertificateException( |
| + "No Trust url Certs."); |
| + } |
| + if (certs == null) { |
| + throw new CertificateException( |
| + "No this-certs array."); |
| + } |
| + if (certs.length < 1) { |
| + throw new CertificateException( |
| + "No this-certs Certs."); |
| + } |
| + if (certs.length != trusturlCerts.length) { |
| + throw new CertificateException( |
| + "certs.length != trusturlCerts.length " + certs.length + " " + trusturlCerts.length); |
| + } |
| + boolean ok = true; |
| + for (int i = 0; i < certs.length; i++) { |
| + if (! trusturlCerts[i].equals(certs[i])) { |
| + ok = false; |
| + dbg("URL: cert mismatch at i=" + i); |
| + dbg("URL: cert mismatch cert" + certs[i]); |
| + dbg("URL: cert mismatch url" + trusturlCerts[i]); |
| + if (cert_fail == null) { |
| + cert_fail = "cert-mismatch"; |
| + } |
| + } |
| + if (debug_certs) { |
| + dbg("\n***********************************************"); |
| + dbg("URL: cert info at i=" + i); |
| + dbg("URL: cert info cert" + certs[i]); |
| + dbg("==============================================="); |
| + dbg("URL: cert info url" + trusturlCerts[i]); |
| + dbg("***********************************************"); |
| + } |
| + } |
| + if (!ok) { |
| + throw new CertificateException( |
| + "Server Cert Chain != URL Cert Chain."); |
| + } |
| + dbg("URL: trusturlCerts[i] matches certs[i] i=0:" + (certs.length-1)); |
| + } |
| + } |
| + }; |
| + |
| + trustSrvCert = new TrustManager[] { |
| + /* |
| + * this one accepts cert given to us in the serverCert |
| + * Applet Parameter we were started with. It is |
| + * currently a fatal error if the VNC Server's cert |
| + * doesn't match it. |
| + */ |
| + new X509TrustManager() { |
| + public java.security.cert.X509Certificate[] |
| + getAcceptedIssuers() { |
| + return null; |
| + } |
| + public void checkClientTrusted( |
| + java.security.cert.X509Certificate[] certs, |
| + String authType) throws CertificateException { |
| + throw new CertificateException("No Clients (SRV)"); |
| + } |
| + public void checkServerTrusted( |
| + java.security.cert.X509Certificate[] certs, |
| + String authType) throws CertificateException { |
| + /* we want to check 'certs' against 'trustsrvCerts' */ |
| + if (trustsrvCerts == null) { |
| + throw new CertificateException( |
| + "No Trust srv Certs array."); |
| + } |
| + if (trustsrvCerts.length < 1) { |
| + throw new CertificateException( |
| + "No Trust srv Certs."); |
| + } |
| + if (certs == null) { |
| + throw new CertificateException( |
| + "No this-certs array."); |
| + } |
| + if (certs.length < 1) { |
| + throw new CertificateException( |
| + "No this-certs Certs."); |
| + } |
| + if (certs.length != trustsrvCerts.length) { |
| + throw new CertificateException( |
| + "certs.length != trustsrvCerts.length " + certs.length + " " + trustsrvCerts.length); |
| + } |
| + boolean ok = true; |
| + for (int i = 0; i < certs.length; i++) { |
| + if (! trustsrvCerts[i].equals(certs[i])) { |
| + ok = false; |
| + dbg("SRV: cert mismatch at i=" + i); |
| + dbg("SRV: cert mismatch cert" + certs[i]); |
| + dbg("SRV: cert mismatch srv" + trustsrvCerts[i]); |
| + if (cert_fail == null) { |
| + cert_fail = "server-cert-mismatch"; |
| + } |
| + } |
| + if (debug_certs) { |
| + dbg("\n***********************************************"); |
| + dbg("SRV: cert info at i=" + i); |
| + dbg("SRV: cert info cert" + certs[i]); |
| + dbg("==============================================="); |
| + dbg("SRV: cert info srv" + trustsrvCerts[i]); |
| + dbg("***********************************************"); |
| + } |
| + } |
| + if (!ok) { |
| + throw new CertificateException( |
| + "Server Cert Chain != serverCert Applet Parameter Cert Chain."); |
| + } |
| + dbg("SRV: trustsrvCerts[i] matches certs[i] i=0:" + (certs.length-1)); |
| + } |
| + } |
| + }; |
| + |
| + trustOneCert = new TrustManager[] { |
| + /* |
| + * this one accepts only the retrieved server |
| + * cert by SSLSocket by this applet we stored in |
| + * trustallCerts that user has accepted or applet |
| + * parameter trustAllVncCerts=yes is set. This is |
| + * for when we reconnect after the user has manually |
| + * accepted the trustall cert in the dialog (or set |
| + * trustAllVncCerts=yes applet param.) |
| + */ |
| + new X509TrustManager() { |
| + public java.security.cert.X509Certificate[] |
| + getAcceptedIssuers() { |
| + return null; |
| + } |
| + public void checkClientTrusted( |
| + java.security.cert.X509Certificate[] certs, |
| + String authType) throws CertificateException { |
| + throw new CertificateException("No Clients (ONE)"); |
| + } |
| + public void checkServerTrusted( |
| + java.security.cert.X509Certificate[] certs, |
| + String authType) throws CertificateException { |
| + /* we want to check 'certs' against 'trustallCerts' */ |
| + if (trustallCerts == null) { |
| + throw new CertificateException( |
| + "No Trust All Server Certs array."); |
| + } |
| + if (trustallCerts.length < 1) { |
| + throw new CertificateException( |
| + "No Trust All Server Certs."); |
| + } |
| + if (certs == null) { |
| + throw new CertificateException( |
| + "No this-certs array."); |
| + } |
| + if (certs.length < 1) { |
| + throw new CertificateException( |
| + "No this-certs Certs."); |
| + } |
| + if (certs.length != trustallCerts.length) { |
| + throw new CertificateException( |
| + "certs.length != trustallCerts.length " + certs.length + " " + trustallCerts.length); |
| + } |
| + boolean ok = true; |
| + for (int i = 0; i < certs.length; i++) { |
| + if (! trustallCerts[i].equals(certs[i])) { |
| + ok = false; |
| + dbg("ONE: cert mismatch at i=" + i); |
| + dbg("ONE: cert mismatch cert" + certs[i]); |
| + dbg("ONE: cert mismatch all" + trustallCerts[i]); |
| + } |
| + if (debug_certs) { |
| + dbg("\n***********************************************"); |
| + dbg("ONE: cert info at i=" + i); |
| + dbg("ONE: cert info cert" + certs[i]); |
| + dbg("==============================================="); |
| + dbg("ONE: cert info all" + trustallCerts[i]); |
| + dbg("***********************************************"); |
| + } |
| + } |
| + if (!ok) { |
| + throw new CertificateException( |
| + "Server Cert Chain != TRUSTALL Cert Chain."); |
| + } |
| + dbg("ONE: trustallCerts[i] matches certs[i] i=0:" + (certs.length-1)); |
| + } |
| + } |
| + }; |
| + |
| + /* |
| + * The above TrustManagers are used: |
| + * |
| + * 1) to retrieve the server cert in case of failure to |
| + * display it to the user in a dialog. |
| + * 2) to subsequently connect to the server if user agrees. |
| + */ |
| + |
| + /* |
| + * build oneTimeKey cert+key if supplied in applet parameter: |
| + */ |
| + if (viewer.oneTimeKey != null && viewer.oneTimeKey.equals("PROMPT")) { |
| + ClientCertDialog d = new ClientCertDialog(); |
| + viewer.oneTimeKey = d.queryUser(); |
| + } |
| + if (viewer.oneTimeKey != null && viewer.oneTimeKey.indexOf(",") > 0) { |
| + int idx = viewer.oneTimeKey.indexOf(","); |
| + |
| + String onetimekey = viewer.oneTimeKey.substring(0, idx); |
| + byte[] key = hex2bytes(onetimekey); |
| + String onetimecert = viewer.oneTimeKey.substring(idx+1); |
| + byte[] cert = hex2bytes(onetimecert); |
| + |
| + KeyFactory kf = KeyFactory.getInstance("RSA"); |
| + PKCS8EncodedKeySpec keysp = new PKCS8EncodedKeySpec ( key ); |
| + PrivateKey ff = kf.generatePrivate (keysp); |
| + if (debug_certs) { |
| + dbg("one time key " + ff); |
| + } |
| + |
| + CertificateFactory cf = CertificateFactory.getInstance("X.509"); |
| + Collection c = cf.generateCertificates(new ByteArrayInputStream(cert)); |
| + Certificate[] certs = new Certificate[c.toArray().length]; |
| + if (c.size() == 1) { |
| + Certificate tmpcert = cf.generateCertificate(new ByteArrayInputStream(cert)); |
| + if (debug_certs) { |
| + dbg("one time cert" + tmpcert); |
| + } |
| + certs[0] = tmpcert; |
| + } else { |
| + certs = (Certificate[]) c.toArray(); |
| + } |
| + |
| + KeyStore ks = KeyStore.getInstance("JKS"); |
| + ks.load(null, null); |
| + ks.setKeyEntry("onetimekey", ff, "".toCharArray(), certs); |
| + String da = KeyManagerFactory.getDefaultAlgorithm(); |
| + KeyManagerFactory kmf = KeyManagerFactory.getInstance(da); |
| + kmf.init(ks, "".toCharArray()); |
| + |
| + mykey = kmf.getKeyManagers(); |
| + } |
| + |
| + /* |
| + * build serverCert cert if supplied in applet parameter: |
| + */ |
| + if (viewer.serverCert != null) { |
| + CertificateFactory cf = CertificateFactory.getInstance("X.509"); |
| + byte[] cert = hex2bytes(viewer.serverCert); |
| + Collection c = cf.generateCertificates(new ByteArrayInputStream(cert)); |
| + trustsrvCerts = new Certificate[c.toArray().length]; |
| + if (c.size() == 1) { |
| + Certificate tmpcert = cf.generateCertificate(new ByteArrayInputStream(cert)); |
| + trustsrvCerts[0] = tmpcert; |
| + } else { |
| + trustsrvCerts = (Certificate[]) c.toArray(); |
| + } |
| + } |
| + |
| + /* the trust loc certs context: */ |
| + try { |
| + trustloc_ctx = SSLContext.getInstance("SSL"); |
| + |
| + /* |
| + * below is a failed attempt to get jvm's default |
| + * trust manager using null (below) makes it so |
| + * for HttpsURLConnection the server cannot be |
| + * verified (no prompting.) |
| + */ |
| + if (false) { |
| + boolean didit = false; |
| + TrustManagerFactory tmf = TrustManagerFactory.getInstance(TrustManagerFactory.getDefaultAlgorithm()); |
| + tmf.init((KeyStore) null); |
| + TrustManager [] tml = tmf.getTrustManagers(); |
| + for (int i = 0; i < tml.length; i++) { |
| + TrustManager tm = tml[i]; |
| + if (tm instanceof X509TrustManager) { |
| + TrustManager tm1[] = new TrustManager[1]; |
| + tm1[0] = tm; |
| + trustloc_ctx.init(mykey, tm1, null); |
| + didit = true; |
| + break; |
| + } |
| + } |
| + if (!didit) { |
| + trustloc_ctx.init(mykey, null, null); |
| + } |
| + } else { |
| + /* we have to set trust manager to null */ |
| + trustloc_ctx.init(mykey, null, null); |
| + } |
| + |
| + } catch (Exception e) { |
| + String msg = "SSL trustloc_ctx FAILED."; |
| + dbg(msg); |
| + throw new Exception(msg); |
| + } |
| + |
| + /* the trust all certs context: */ |
| + try { |
| + trustall_ctx = SSLContext.getInstance("SSL"); |
| + trustall_ctx.init(mykey, trustAllCerts, new |
| + java.security.SecureRandom()); |
| + |
| + } catch (Exception e) { |
| + String msg = "SSL trustall_ctx FAILED."; |
| + dbg(msg); |
| + throw new Exception(msg); |
| + } |
| + |
| + /* the trust url certs context: */ |
| + try { |
| + trusturl_ctx = SSLContext.getInstance("SSL"); |
| + trusturl_ctx.init(mykey, trustUrlCert, new |
| + java.security.SecureRandom()); |
| + |
| + } catch (Exception e) { |
| + String msg = "SSL trusturl_ctx FAILED."; |
| + dbg(msg); |
| + throw new Exception(msg); |
| + } |
| + |
| + /* the trust srv certs context: */ |
| + try { |
| + trustsrv_ctx = SSLContext.getInstance("SSL"); |
| + trustsrv_ctx.init(mykey, trustSrvCert, new |
| + java.security.SecureRandom()); |
| + |
| + } catch (Exception e) { |
| + String msg = "SSL trustsrv_ctx FAILED."; |
| + dbg(msg); |
| + throw new Exception(msg); |
| + } |
| + |
| + /* the trust the one cert from server context: */ |
| + try { |
| + trustone_ctx = SSLContext.getInstance("SSL"); |
| + trustone_ctx.init(mykey, trustOneCert, new |
| + java.security.SecureRandom()); |
| + |
| + } catch (Exception e) { |
| + String msg = "SSL trustone_ctx FAILED."; |
| + dbg(msg); |
| + throw new Exception(msg); |
| + } |
| + } |
| + |
| + /* |
| + * we call this early on to 1) check for a proxy, 2) grab |
| + * Browser/JVM accepted HTTPS cert. |
| + */ |
| + public void check_for_proxy_and_grab_vnc_server_cert() { |
| + |
| + trusturlCerts = null; |
| + proxy_in_use = false; |
| + |
| + if (viewer.ignoreProxy) { |
| + /* applet param says skip it. */ |
| + /* the downside is we do not set trusturlCerts for comparison later... */ |
| + /* nor do we autodetect x11vnc for GET=1. */ |
| + return; |
| + } |
| + |
| + dbg("------------------------------------------------"); |
| + dbg("Into check_for_proxy_and_grab_vnc_server_cert():"); |
| + |
| + dbg("TRYING HTTPS:"); |
| + String ustr = "https://" + host + ":"; |
| + if (viewer.httpsPort != null) { |
| + ustr += viewer.httpsPort; |
| + } else { |
| + ustr += port; |
| + } |
| + ustr += viewer.urlPrefix + "/check.https.proxy.connection"; |
| + dbg("ustr is: " + ustr); |
| + |
| + try { |
| + /* prepare for an HTTPS URL connection to host:port */ |
| + URL url = new URL(ustr); |
| + HttpsURLConnection https = (HttpsURLConnection) url.openConnection(); |
| + |
| + if (mykey != null) { |
| + /* with oneTimeKey (mykey) we can't use the default SSL context */ |
| + if (trustsrvCerts != null) { |
| + dbg("passing trustsrv_ctx to HttpsURLConnection to provide client cert."); |
| + https.setSSLSocketFactory(trustsrv_ctx.getSocketFactory()); |
| + } else if (trustloc_ctx != null) { |
| + dbg("passing trustloc_ctx to HttpsURLConnection to provide client cert."); |
| + https.setSSLSocketFactory(trustloc_ctx.getSocketFactory()); |
| + } |
| + } |
| + |
| + https.setUseCaches(false); |
| + https.setRequestMethod("GET"); |
| + https.setRequestProperty("Pragma", "No-Cache"); |
| + https.setRequestProperty("Proxy-Connection", "Keep-Alive"); |
| + https.setDoInput(true); |
| + |
| + dbg("trying https.connect()"); |
| + https.connect(); |
| + |
| + dbg("trying https.getServerCertificates()"); |
| + trusturlCerts = https.getServerCertificates(); |
| + |
| + if (trusturlCerts == null) { |
| + dbg("set trusturlCerts to null!"); |
| + } else { |
| + dbg("set trusturlCerts to non-null"); |
| + } |
| + |
| + if (https.usingProxy()) { |
| + proxy_in_use = true; |
| + dbg("An HTTPS proxy is in use. There may be connection problems."); |
| + } |
| + |
| + dbg("trying https.getContent()"); |
| + Object output = https.getContent(); |
| + dbg("trying https.disconnect()"); |
| + https.disconnect(); |
| + if (! viewer.GET) { |
| + String header = https.getHeaderField("VNC-Server"); |
| + if (header != null && header.startsWith("x11vnc")) { |
| + dbg("detected x11vnc server (1), setting GET=1"); |
| + viewer.GET = true; |
| + } |
| + } |
| + |
| + } catch(Exception e) { |
| + dbg("HttpsURLConnection: " + e.getMessage()); |
| + } |
| + |
| + if (proxy_in_use) { |
| + dbg("exit check_for_proxy_and_grab_vnc_server_cert():"); |
| + dbg("------------------------------------------------"); |
| + return; |
| + } else if (trusturlCerts != null && !viewer.forceProxy) { |
| + /* Allow user to require HTTP check? use forceProxy for now. */ |
| + dbg("SKIPPING HTTP PROXY CHECK: got trusturlCerts, assuming proxy info is correct."); |
| + dbg("exit check_for_proxy_and_grab_vnc_server_cert():"); |
| + dbg("------------------------------------------------"); |
| + return; |
| + } |
| + |
| + /* |
| + * XXX need to remember scenario where this extra check |
| + * gives useful info. User's Browser proxy settings? |
| + */ |
| + dbg("TRYING HTTP:"); |
| + ustr = "http://" + host + ":" + port; |
| + ustr += viewer.urlPrefix + "/index.vnc"; |
| + dbg("ustr is: " + ustr); |
| + |
| + try { |
| + /* prepare for an HTTP URL connection to the same host:port (but not httpsPort) */ |
| + URL url = new URL(ustr); |
| + HttpURLConnection http = (HttpURLConnection) |
| + url.openConnection(); |
| + |
| + http.setUseCaches(false); |
| + http.setRequestMethod("GET"); |
| + http.setRequestProperty("Pragma", "No-Cache"); |
| + http.setRequestProperty("Proxy-Connection", "Keep-Alive"); |
| + http.setDoInput(true); |
| + |
| + dbg("trying http.connect()"); |
| + http.connect(); |
| + |
| + if (http.usingProxy()) { |
| + proxy_in_use = true; |
| + dbg("An HTTP proxy is in use. There may be connection problems."); |
| + } |
| + dbg("trying http.getContent()"); |
| + Object output = http.getContent(); |
| + dbg("trying http.disconnect()"); |
| + http.disconnect(); |
| + if (! viewer.GET) { |
| + String header = http.getHeaderField("VNC-Server"); |
| + if (header != null && header.startsWith("x11vnc")) { |
| + dbg("detected x11vnc server (2), setting GET=1"); |
| + viewer.GET = true; |
| + } |
| + } |
| + } catch(Exception e) { |
| + dbg("HttpURLConnection: " + e.getMessage()); |
| + } |
| + dbg("exit check_for_proxy_and_grab_vnc_server_cert():"); |
| + dbg("------------------------------------------------"); |
| + } |
| + |
| + public Socket connectSock() throws IOException { |
| + /* |
| + * first try a https connection to detect a proxy, and |
| + * grab the VNC server cert at the same time: |
| + */ |
| + check_for_proxy_and_grab_vnc_server_cert(); |
| + |
| + boolean srv_cert = false; |
| + |
| + if (trustsrvCerts != null) { |
| + /* applet parameter suppled serverCert */ |
| + dbg("viewer.trustSrvCert-0 using trustsrv_ctx"); |
| + factory = trustsrv_ctx.getSocketFactory(); |
| + srv_cert = true; |
| + } else if (viewer.trustAllVncCerts) { |
| + /* trust all certs (no checking) */ |
| + dbg("viewer.trustAllVncCerts-0 using trustall_ctx"); |
| + factory = trustall_ctx.getSocketFactory(); |
| + } else if (trusturlCerts != null) { |
| + /* trust certs the Browser/JVM accepted in check_for_proxy... */ |
| + dbg("using trusturl_ctx"); |
| + factory = trusturl_ctx.getSocketFactory(); |
| + } else { |
| + /* trust the local defaults */ |
| + dbg("using trustloc_ctx"); |
| + factory = trustloc_ctx.getSocketFactory(); |
| + } |
| + |
| + socket = null; |
| + |
| + try { |
| + if (proxy_in_use && viewer.forceProxy) { |
| + throw new Exception("forcing proxy (forceProxy)"); |
| + } else if (viewer.CONNECT != null) { |
| + throw new Exception("forcing CONNECT"); |
| + } |
| + |
| + int timeout = 6; |
| + if (timeout > 0) { |
| + socket = (SSLSocket) factory.createSocket(); |
| + InetSocketAddress inetaddr = new InetSocketAddress(host, port); |
| + dbg("Using timeout of " + timeout + " secs to: " + host + ":" + port); |
| + socket.connect(inetaddr, timeout * 1000); |
| + } else { |
| + socket = (SSLSocket) factory.createSocket(host, port); |
| + } |
| + |
| + } catch (Exception esock) { |
| + dbg("socket error: " + esock.getMessage()); |
| + if (proxy_in_use || viewer.CONNECT != null) { |
| + proxy_failure = true; |
| + if (proxy_in_use) { |
| + dbg("HTTPS proxy in use. Trying to go with it."); |
| + } else { |
| + dbg("viewer.CONNECT reverse proxy in use. Trying to go with it."); |
| + } |
| + try { |
| + socket = proxy_socket(factory); |
| + } catch (Exception e) { |
| + dbg("proxy_socket error: " + e.getMessage()); |
| + } |
| + } else { |
| + /* n.b. socket is left in error state to cause ex. below. */ |
| + } |
| + } |
| + |
| + try { |
| + socket.startHandshake(); |
| + |
| + dbg("The Server Connection Verified OK on 1st try."); |
| + |
| + java.security.cert.Certificate[] currentTrustedCerts; |
| + BrowserCertsDialog bcd; |
| + |
| + SSLSession sess = socket.getSession(); |
| + currentTrustedCerts = sess.getPeerCertificates(); |
| + |
| + if (viewer.trustAllVncCerts) { |
| + dbg("viewer.trustAllVncCerts-1 keeping socket."); |
| + } else if (currentTrustedCerts == null || currentTrustedCerts.length < 1) { |
| + try { |
| + socket.close(); |
| + } catch (Exception e) { |
| + dbg("socket is grumpy."); |
| + } |
| + socket = null; |
| + throw new SSLHandshakeException("no current certs"); |
| + } |
| + |
| + String serv = ""; |
| + try { |
| + CertInfo ci = new CertInfo(currentTrustedCerts[0]); |
| + serv = ci.get_certinfo("CN"); |
| + } catch (Exception e) { |
| + ; |
| + } |
| + |
| + if (viewer.trustAllVncCerts) { |
| + dbg("viewer.trustAllVncCerts-2 skipping browser certs dialog"); |
| + user_wants_to_see_cert = false; |
| + } else if (viewer.serverCert != null && trustsrvCerts != null) { |
| + dbg("viewer.serverCert-1 skipping browser certs dialog"); |
| + user_wants_to_see_cert = false; |
| + } else if (viewer.trustUrlVncCert) { |
| + dbg("viewer.trustUrlVncCert-1 skipping browser certs dialog"); |
| + user_wants_to_see_cert = false; |
| + } else { |
| + /* have a dialog with the user: */ |
| + bcd = new BrowserCertsDialog(serv, host + ":" + port); |
| + dbg("browser certs dialog begin."); |
| + bcd.queryUser(); |
| + dbg("browser certs dialog finished."); |
| + |
| + if (bcd.showCertDialog) { |
| + String msg = "user wants to see cert"; |
| + dbg(msg); |
| + user_wants_to_see_cert = true; |
| + if (cert_fail == null) { |
| + cert_fail = "user-view"; |
| + } |
| + throw new SSLHandshakeException(msg); |
| + } else { |
| + user_wants_to_see_cert = false; |
| + dbg("browser certs dialog: user said yes, accept it"); |
| + } |
| + } |
| + |
| + } catch (SSLHandshakeException eh) { |
| + dbg("SSLHandshakeException: could not automatically verify Server."); |
| + dbg("msg: " + eh.getMessage()); |
| + |
| + |
| + /* send a cleanup string just in case: */ |
| + String getoutstr = "GET /index.vnc HTTP/1.0\r\nConnection: close\r\n\r\n"; |
| + |
| + try { |
| + OutputStream os = socket.getOutputStream(); |
| + os.write(getoutstr.getBytes()); |
| + socket.close(); |
| + } catch (Exception e) { |
| + dbg("socket is grumpy!"); |
| + } |
| + |
| + /* reload */ |
| + |
| + socket = null; |
| + |
| + String reason = null; |
| + |
| + if (srv_cert) { |
| + /* for serverCert usage we make this a fatal error. */ |
| + throw new IOException("Fatal: VNC Server's Cert does not match Applet Parameter 'serverCert=...'"); |
| + /* see below in TrustDialog were we describe this case to user anyway */ |
| + } |
| + |
| + /* |
| + * Reconnect, trusting any cert, so we can grab |
| + * the cert to show it to the user in a dialog |
| + * for him to manually accept. This connection |
| + * is not used for anything else. |
| + */ |
| + factory = trustall_ctx.getSocketFactory(); |
| + if (proxy_failure) { |
| + socket = proxy_socket(factory); |
| + } else { |
| + socket = (SSLSocket) factory.createSocket(host, port); |
| + } |
| + |
| + if (debug_certs) { |
| + dbg("trusturlCerts: " + trusturlCerts); |
| + dbg("trustsrvCerts: " + trustsrvCerts); |
| + } |
| + if (trusturlCerts == null && cert_fail == null) { |
| + cert_fail = "missing-certs"; |
| + } |
| + |
| + try { |
| + socket.startHandshake(); |
| + |
| + dbg("The TrustAll Server Cert-grab Connection (trivially) Verified OK."); |
| + |
| + /* grab the cert: */ |
| + try { |
| + SSLSession sess = socket.getSession(); |
| + trustallCerts = sess.getPeerCertificates(); |
| + } catch (Exception e) { |
| + throw new Exception("Could not get " + |
| + "Peer Certificate"); |
| + } |
| + if (debug_certs) { |
| + dbg("trustallCerts: " + trustallCerts); |
| + } |
| + |
| + if (viewer.trustAllVncCerts) { |
| + dbg("viewer.trustAllVncCerts-3. skipping dialog, trusting everything."); |
| + } else if (! browser_cert_match()) { |
| + /* |
| + * close socket now, we will reopen after |
| + * dialog if user agrees to use the cert. |
| + */ |
| + try { |
| + OutputStream os = socket.getOutputStream(); |
| + os.write(getoutstr.getBytes()); |
| + socket.close(); |
| + } catch (Exception e) { |
| + dbg("socket is grumpy!!"); |
| + } |
| + socket = null; |
| + |
| + /* dialog with user to accept cert or not: */ |
| + |
| + TrustDialog td= new TrustDialog(host, port, |
| + trustallCerts); |
| + |
| + if (cert_fail == null) { |
| + ; |
| + } else if (cert_fail.equals("user-view")) { |
| + reason = "Reason for this Dialog:\n\n" |
| + + " You Asked to View the Certificate."; |
| + } else if (cert_fail.equals("server-cert-mismatch")) { |
| + /* this is now fatal error, see above. */ |
| + reason = "Reason for this Dialog:\n\n" |
| + + " The VNC Server's Certificate does not match the Certificate\n" |
| + + " specified in the supplied 'serverCert' Applet Parameter."; |
| + } else if (cert_fail.equals("cert-mismatch")) { |
| + reason = "Reason for this Dialog:\n\n" |
| + + " The VNC Server's Certificate does not match the Website's\n" |
| + + " HTTPS Certificate (that you previously accepted; either\n" |
| + + " manually or automatically via Certificate Authority.)"; |
| + } else if (cert_fail.equals("missing-certs")) { |
| + reason = "Reason for this Dialog:\n\n" |
| + + " Not all Certificates could be obtained to check."; |
| + } |
| + |
| + if (! td.queryUser(reason)) { |
| + String msg = "User decided against it."; |
| + dbg(msg); |
| + throw new IOException(msg); |
| + } |
| + } |
| + |
| + } catch (Exception ehand2) { |
| + dbg("** Could not TrustAll Verify Server!"); |
| + |
| + throw new IOException(ehand2.getMessage()); |
| + } |
| + |
| + /* reload again: */ |
| + |
| + if (socket != null) { |
| + try { |
| + socket.close(); |
| + } catch (Exception e) { |
| + dbg("socket is grumpy!!!"); |
| + } |
| + socket = null; |
| + } |
| + |
| + /* |
| + * Now connect a 3rd time, using the cert |
| + * retrieved during connection 2 (sadly, that |
| + * the user likely blindly agreed to...) |
| + */ |
| + |
| + factory = trustone_ctx.getSocketFactory(); |
| + if (proxy_failure) { |
| + socket = proxy_socket(factory); |
| + } else { |
| + socket = (SSLSocket) factory.createSocket(host, port); |
| + } |
| + |
| + try { |
| + socket.startHandshake(); |
| + dbg("TrustAll/TrustOne Server Connection Verified #3."); |
| + |
| + } catch (Exception ehand3) { |
| + dbg("** Could not TrustAll/TrustOne Verify Server #3."); |
| + |
| + throw new IOException(ehand3.getMessage()); |
| + } |
| + } |
| + |
| + /* we have socket (possibly null) at this point, so proceed: */ |
| + |
| + /* handle x11vnc GET=1, if applicable: */ |
| + if (socket != null && viewer.GET) { |
| + String str = "GET "; |
| + str += viewer.urlPrefix; |
| + str += "/request.https.vnc.connection"; |
| + str += " HTTP/1.0\r\n"; |
| + str += "Pragma: No-Cache\r\n"; |
| + str += "\r\n"; |
| + |
| + System.out.println("sending: " + str); |
| + OutputStream os = socket.getOutputStream(); |
| + String type = "os"; |
| + |
| + if (type == "os") { |
| + os.write(str.getBytes()); |
| + os.flush(); |
| + System.out.println("used OutputStream"); |
| + } else if (type == "bs") { |
| + BufferedOutputStream bs = new BufferedOutputStream(os); |
| + bs.write(str.getBytes()); |
| + bs.flush(); |
| + System.out.println("used BufferedOutputStream"); |
| + } else if (type == "ds") { |
| + DataOutputStream ds = new DataOutputStream(os); |
| + ds.write(str.getBytes()); |
| + ds.flush(); |
| + System.out.println("used DataOutputStream"); |
| + } |
| + if (false) { |
| + String rep = ""; |
| + DataInputStream is = new DataInputStream( |
| + new BufferedInputStream(socket.getInputStream(), 16384)); |
| + while (true) { |
| + rep += readline(is); |
| + if (rep.indexOf("\r\n\r\n") >= 0) { |
| + break; |
| + } |
| + } |
| + System.out.println("rep: " + rep); |
| + } |
| + } |
| + |
| + dbg("SSL returning socket to caller."); |
| + dbg(""); |
| + |
| + /* could be null, let caller handle that. */ |
| + return (Socket) socket; |
| + } |
| + |
| + boolean browser_cert_match() { |
| + String msg = "Browser URL accept previously accepted cert"; |
| + |
| + if (user_wants_to_see_cert) { |
| + return false; |
| + } |
| + |
| + if (viewer.serverCert != null || trustsrvCerts != null) { |
| + if (cert_fail == null) { |
| + cert_fail = "server-cert-mismatch"; |
| + } |
| + } |
| + if (trustallCerts != null && trusturlCerts != null) { |
| + if (trustallCerts.length == trusturlCerts.length) { |
| + boolean ok = true; |
| + /* check toath trustallCerts (socket) equals trusturlCerts (browser) */ |
| + for (int i = 0; i < trusturlCerts.length; i++) { |
| + if (! trustallCerts[i].equals(trusturlCerts[i])) { |
| + dbg("BCM: cert mismatch at i=" + i); |
| + dbg("BCM: cert mismatch url" + trusturlCerts[i]); |
| + dbg("BCM: cert mismatch all" + trustallCerts[i]); |
| + ok = false; |
| + } |
| + } |
| + if (ok) { |
| + System.out.println(msg); |
| + if (cert_fail == null) { |
| + cert_fail = "did-not-fail"; |
| + } |
| + return true; |
| + } else { |
| + if (cert_fail == null) { |
| + cert_fail = "cert-mismatch"; |
| + } |
| + return false; |
| + } |
| + } |
| + } |
| + if (cert_fail == null) { |
| + cert_fail = "missing-certs"; |
| + } |
| + return false; |
| + } |
| + |
| + private void dbg(String s) { |
| + if (debug) { |
| + System.out.println(s); |
| + } |
| + } |
| + |
| + private int gint(String s) { |
| + int n = -1; |
| + try { |
| + Integer I = new Integer(s); |
| + n = I.intValue(); |
| + } catch (Exception ex) { |
| + return -1; |
| + } |
| + return n; |
| + } |
| + |
| + /* this will do the proxy CONNECT negotiation and hook us up. */ |
| + |
| + private void proxy_helper(String proxyHost, int proxyPort) { |
| + |
| + boolean proxy_auth = false; |
| + String proxy_auth_basic_realm = ""; |
| + String hp = host + ":" + port; |
| + dbg("proxy_helper: " + proxyHost + ":" + proxyPort + " hp: " + hp); |
| + |
| + /* we loop here a few times trying for the password case */ |
| + for (int k=0; k < 2; k++) { |
| + dbg("proxy_in_use psocket: " + k); |
| + |
| + if (proxySock != null) { |
| + try { |
| + proxySock.close(); |
| + } catch (Exception e) { |
| + dbg("proxy socket is grumpy."); |
| + } |
| + } |
| + |
| + proxySock = psocket(proxyHost, proxyPort); |
| + if (proxySock == null) { |
| + dbg("1-a sadly, returning a null socket"); |
| + return; |
| + } |
| + |
| + String req1 = "CONNECT " + hp + " HTTP/1.1\r\n" |
| + + "Host: " + hp + "\r\n"; |
| + |
| + dbg("requesting via proxy: " + req1); |
| + |
| + if (proxy_auth) { |
| + if (proxy_auth_string == null) { |
| + ProxyPasswdDialog pp = new ProxyPasswdDialog(proxyHost, proxyPort, proxy_auth_basic_realm); |
| + pp.queryUser(); |
| + proxy_auth_string = pp.getAuth(); |
| + } |
| + //dbg("auth1: " + proxy_auth_string); |
| + |
| + String auth2 = Base64Coder.encodeString(proxy_auth_string); |
| + //dbg("auth2: " + auth2); |
| + |
| + req1 += "Proxy-Authorization: Basic " + auth2 + "\r\n"; |
| + //dbg("req1: " + req1); |
| + |
| + dbg("added Proxy-Authorization: Basic ... to request"); |
| + } |
| + req1 += "\r\n"; |
| + |
| + try { |
| + proxy_os.write(req1.getBytes()); |
| + String reply = readline(proxy_is); |
| + |
| + dbg("proxy replied: " + reply.trim()); |
| + |
| + if (reply.indexOf("HTTP/1.") == 0 && reply.indexOf(" 407 ") > 0) { |
| + proxy_auth = true; |
| + proxySock.close(); |
| + } else if (reply.indexOf("HTTP/1.") < 0 && reply.indexOf(" 200") < 0) { |
| + proxySock.close(); |
| + proxySock = psocket(proxyHost, proxyPort); |
| + if (proxySock == null) { |
| + dbg("2-a sadly, returning a null socket"); |
| + return; |
| + } |
| + } |
| + } catch(Exception e) { |
| + dbg("some proxy socket problem: " + e.getMessage()); |
| + } |
| + |
| + /* read the rest of the HTTP headers */ |
| + while (true) { |
| + String line = readline(proxy_is); |
| + dbg("proxy line: " + line.trim()); |
| + if (proxy_auth) { |
| + String uc = line.toLowerCase(); |
| + if (uc.indexOf("proxy-authenticate:") == 0) { |
| + if (uc.indexOf(" basic ") >= 0) { |
| + int idx = uc.indexOf(" realm"); |
| + if (idx >= 0) { |
| + proxy_auth_basic_realm = uc.substring(idx+1); |
| + } |
| + } |
| + } |
| + } |
| + if (line.equals("\r\n") || line.equals("\n")) { |
| + break; |
| + } |
| + } |
| + if (!proxy_auth || proxy_auth_basic_realm.equals("")) { |
| + /* we only try once for the non-password case: */ |
| + break; |
| + } |
| + } |
| + } |
| + |
| + public SSLSocket proxy_socket(SSLSocketFactory factory) { |
| + Properties props = null; |
| + String proxyHost = null; |
| + int proxyPort = 0; |
| + String proxyHost_nossl = null; |
| + int proxyPort_nossl = 0; |
| + String str; |
| + |
| + /* see if we can guess the proxy info from Properties: */ |
| + try { |
| + props = System.getProperties(); |
| + } catch (Exception e) { |
| + /* sandboxed applet might not be able to read it. */ |
| + dbg("props failed: " + e.getMessage()); |
| + } |
| + if (viewer.proxyHost != null) { |
| + dbg("Using supplied proxy " + viewer.proxyHost + " " + viewer.proxyPort + " applet parameters."); |
| + proxyHost = viewer.proxyHost; |
| + if (viewer.proxyPort != null) { |
| + proxyPort = gint(viewer.proxyPort); |
| + } else { |
| + proxyPort = 8080; |
| + } |
| + |
| + } else if (props != null) { |
| + dbg("\n---------------\nAll props:"); |
| + props.list(System.out); |
| + dbg("\n---------------\n\n"); |
| + |
| + /* scrape throught properties looking for proxy info: */ |
| + |
| + for (Enumeration e = props.propertyNames(); e.hasMoreElements(); ) { |
| + String s = (String) e.nextElement(); |
| + String v = System.getProperty(s); |
| + String s2 = s.toLowerCase(); |
| + String v2 = v.toLowerCase(); |
| + |
| + if (s2.indexOf("proxy.https.host") >= 0) { |
| + proxyHost = v2; |
| + continue; |
| + } |
| + if (s2.indexOf("proxy.https.port") >= 0) { |
| + proxyPort = gint(v2); |
| + continue; |
| + } |
| + if (s2.indexOf("proxy.http.host") >= 0) { |
| + proxyHost_nossl = v2; |
| + continue; |
| + } |
| + if (s2.indexOf("proxy.http.port") >= 0) { |
| + proxyPort_nossl = gint(v2); |
| + continue; |
| + } |
| + } |
| + |
| + for (Enumeration e = props.propertyNames(); e.hasMoreElements(); ) { |
| + String s = (String) e.nextElement(); |
| + String v = System.getProperty(s); |
| + String s2 = s.toLowerCase(); |
| + String v2 = v.toLowerCase(); |
| + |
| + if (proxyHost != null && proxyPort > 0) { |
| + break; |
| + } |
| + |
| + // look for something like: javaplugin.proxy.config.list = http=10.0.2.1:8082 |
| + if (s2.indexOf("proxy") < 0 && v2.indexOf("proxy") < 0) { |
| + continue; |
| + } |
| + if (v2.indexOf("http") < 0) { |
| + continue; |
| + } |
| + |
| + String[] pieces = v.split("[,;]"); |
| + for (int i = 0; i < pieces.length; i++) { |
| + String p = pieces[i]; |
| + int j = p.indexOf("https"); |
| + if (j < 0) { |
| + j = p.indexOf("http"); |
| + if (j < 0) { |
| + continue; |
| + } |
| + } |
| + j = p.indexOf("=", j); |
| + if (j < 0) { |
| + continue; |
| + } |
| + p = p.substring(j+1); |
| + String [] hp = p.split(":"); |
| + if (hp.length != 2) { |
| + continue; |
| + } |
| + if (hp[0].length() > 1 && hp[1].length() > 1) { |
| + |
| + proxyPort = gint(hp[1]); |
| + if (proxyPort < 0) { |
| + continue; |
| + } |
| + proxyHost = new String(hp[0]); |
| + break; |
| + } |
| + } |
| + } |
| + } |
| + if (proxyHost != null) { |
| + if (proxyHost_nossl != null && proxyPort_nossl > 0) { |
| + dbg("Using http proxy info instead of https."); |
| + proxyHost = proxyHost_nossl; |
| + proxyPort = proxyPort_nossl; |
| + } |
| + } |
| + |
| + if (proxy_in_use) { |
| + if (proxy_dialog_host != null && proxy_dialog_port > 0) { |
| + proxyHost = proxy_dialog_host; |
| + proxyPort = proxy_dialog_port; |
| + } |
| + if (proxyHost != null) { |
| + dbg("Lucky us! we figured out the Proxy parameters: " + proxyHost + " " + proxyPort); |
| + } else { |
| + /* ask user to help us: */ |
| + ProxyDialog pd = new ProxyDialog(proxyHost, proxyPort); |
| + pd.queryUser(); |
| + proxyHost = pd.getHost(); |
| + proxyPort = pd.getPort(); |
| + proxy_dialog_host = new String(proxyHost); |
| + proxy_dialog_port = proxyPort; |
| + dbg("User said host: " + pd.getHost() + " port: " + pd.getPort()); |
| + } |
| + |
| + proxy_helper(proxyHost, proxyPort); |
| + if (proxySock == null) { |
| + return null; |
| + } |
| + } else if (viewer.CONNECT != null) { |
| + dbg("viewer.CONNECT psocket:"); |
| + proxySock = psocket(host, port); |
| + if (proxySock == null) { |
| + dbg("1-b sadly, returning a null socket"); |
| + return null; |
| + } |
| + } |
| + |
| + if (viewer.CONNECT != null) { |
| + String hp = viewer.CONNECT; |
| + String req2 = "CONNECT " + hp + " HTTP/1.1\r\n" |
| + + "Host: " + hp + "\r\n\r\n"; |
| + |
| + dbg("requesting2: " + req2); |
| + |
| + try { |
| + proxy_os.write(req2.getBytes()); |
| + String reply = readline(proxy_is); |
| + |
| + dbg("proxy replied2: " + reply.trim()); |
| + |
| + if (reply.indexOf("HTTP/1.") < 0 && reply.indexOf(" 200") < 0) { |
| + proxySock.close(); |
| + proxySock = psocket(proxyHost, proxyPort); |
| + if (proxySock == null) { |
| + dbg("2-b sadly, returning a null socket"); |
| + return null; |
| + } |
| + } |
| + } catch(Exception e) { |
| + dbg("proxy socket problem-2: " + e.getMessage()); |
| + } |
| + |
| + while (true) { |
| + String line = readline(proxy_is); |
| + dbg("proxy line2: " + line.trim()); |
| + if (line.equals("\r\n") || line.equals("\n")) { |
| + break; |
| + } |
| + } |
| + } |
| + |
| + Socket sslsock = null; |
| + try { |
| + sslsock = factory.createSocket(proxySock, host, port, true); |
| + } catch(Exception e) { |
| + dbg("sslsock prob: " + e.getMessage()); |
| + dbg("3 sadly, returning a null socket"); |
| + } |
| + |
| + return (SSLSocket) sslsock; |
| + } |
| + |
| + Socket psocket(String h, int p) { |
| + Socket psock = null; |
| + try { |
| + psock = new Socket(h, p); |
| + proxy_is = new DataInputStream(new BufferedInputStream( |
| + psock.getInputStream(), 16384)); |
| + proxy_os = psock.getOutputStream(); |
| + } catch(Exception e) { |
| + dbg("psocket prob: " + e.getMessage()); |
| + return null; |
| + } |
| + |
| + return psock; |
| + } |
| + |
| + String readline(DataInputStream i) { |
| + byte[] ba = new byte[1]; |
| + String s = new String(""); |
| + ba[0] = 0; |
| + try { |
| + while (ba[0] != 0xa) { |
| + ba[0] = (byte) i.readUnsignedByte(); |
| + s += new String(ba); |
| + } |
| + } catch (Exception e) { |
| + ; |
| + } |
| + return s; |
| + } |
| +} |
| + |
| +class TrustDialog implements ActionListener { |
| + String msg, host, text; |
| + int port; |
| + java.security.cert.Certificate[] trustallCerts = null; |
| + boolean viewing_cert = false; |
| + boolean trust_this_session = false; |
| + |
| + /* |
| + * this is the gui to show the user the cert and info and ask |
| + * them if they want to continue using this cert. |
| + */ |
| + |
| + Button ok, cancel, viewcert; |
| + TextArea textarea; |
| + Checkbox accept, deny; |
| + Dialog dialog; |
| + |
| + String s1 = "Accept this certificate temporarily for this session"; |
| + String s2 = "Do not accept this certificate and do not connect to" |
| + + " this VNC server"; |
| + String ln = "\n---------------------------------------------------\n\n"; |
| + |
| + TrustDialog (String h, int p, java.security.cert.Certificate[] s) { |
| + host = h; |
| + port = p; |
| + trustallCerts = s; |
| + |
| + msg = "VNC Server " + host + ":" + port + " Not Verified"; |
| + } |
| + |
| + public boolean queryUser(String reason) { |
| + |
| + /* create and display the dialog for unverified cert. */ |
| + |
| + Frame frame = new Frame(msg); |
| + |
| + dialog = new Dialog(frame, true); |
| + |
| + String infostr = ""; |
| + if (trustallCerts.length == 1) { |
| + CertInfo ci = new CertInfo(trustallCerts[0]); |
| + infostr = ci.get_certinfo("all"); |
| + } |
| + if (reason != null) { |
| + reason += "\n\n"; |
| + } |
| + |
| + text = "\n" |
| ++ "Unable to verify the identity of\n" |
| ++ "\n" |
| ++ " " + host + ":" + port + "\n" |
| ++ "\n" |
| ++ infostr |
| ++ "\n" |
| ++ "as a trusted VNC server.\n" |
| ++ "\n" |
| ++ reason |
| ++ "In General not being able to verify the VNC Server and/or your seeing this Dialog\n" |
| ++ "is due to one of the following:\n" |
| ++ "\n" |
| ++ " - Your requesting to View the Certificate before accepting.\n" |
| ++ "\n" |
| ++ " - The VNC server is using a Self-Signed Certificate or a Certificate\n" |
| ++ " Authority not recognized by your Web Browser or Java Plugin runtime.\n" |
| ++ "\n" |
| ++ " - The use of an Apache SSL portal scheme employing CONNECT proxying AND\n" |
| ++ " the Apache Web server has a certificate *different* from the VNC server's.\n" |
| ++ "\n" |
| ++ " - No previously accepted Certificate (via Web Broswer/Java Plugin) could be\n" |
| ++ " obtained by this applet to compare the VNC Server Certificate against.\n" |
| ++ "\n" |
| ++ " - The VNC Server's Certificate does not match the one specified in the\n" |
| ++ " supplied 'serverCert' Java Applet Parameter.\n" |
| ++ "\n" |
| ++ " - A Man-In-The-Middle attack impersonating as the VNC server that you wish\n" |
| ++ " to connect to. (Wouldn't that be exciting!!)\n" |
| ++ "\n" |
| ++ "By safely copying the VNC server's Certificate (or using a common Certificate\n" |
| ++ "Authority certificate) you can configure your Web Browser and Java Plugin to\n" |
| ++ "automatically authenticate this VNC Server.\n" |
| ++ "\n" |
| ++ "If you do so, then you will only have to click \"Yes\" when this VNC Viewer\n" |
| ++ "applet asks you whether to trust your Browser/Java Plugin's acceptance of the\n" |
| ++ "certificate (except for the Apache portal case above where they don't match.)\n" |
| ++ "\n" |
| ++ "You can also set the applet parameter 'trustUrlVncCert=yes' to automatically\n" |
| ++ "accept certificates already accepted/trusted by your Web Browser/Java Plugin,\n" |
| ++ "and thereby see no dialog from this VNC Viewer applet.\n" |
| +; |
| + |
| + /* the accept / do-not-accept radio buttons: */ |
| + CheckboxGroup checkbox = new CheckboxGroup(); |
| + accept = new Checkbox(s1, true, checkbox); |
| + deny = new Checkbox(s2, false, checkbox); |
| + |
| + /* put the checkboxes in a panel: */ |
| + Panel check = new Panel(); |
| + check.setLayout(new GridLayout(2, 1)); |
| + |
| + check.add(accept); |
| + check.add(deny); |
| + |
| + /* make the 3 buttons: */ |
| + ok = new Button("OK"); |
| + cancel = new Button("Cancel"); |
| + viewcert = new Button("View Certificate"); |
| + |
| + ok.addActionListener(this); |
| + cancel.addActionListener(this); |
| + viewcert.addActionListener(this); |
| + |
| + /* put the buttons in their own panel: */ |
| + Panel buttonrow = new Panel(); |
| + buttonrow.setLayout(new FlowLayout(FlowLayout.LEFT)); |
| + buttonrow.add(viewcert); |
| + buttonrow.add(ok); |
| + buttonrow.add(cancel); |
| + |
| + /* label at the top: */ |
| + Label label = new Label(msg, Label.CENTER); |
| + label.setFont(new Font("Helvetica", Font.BOLD, 16)); |
| + |
| + /* textarea in the middle */ |
| + textarea = new TextArea(text, 38, 64, |
| + TextArea.SCROLLBARS_VERTICAL_ONLY); |
| + textarea.setEditable(false); |
| + |
| + /* put the two panels in their own panel at bottom: */ |
| + Panel bot = new Panel(); |
| + bot.setLayout(new GridLayout(2, 1)); |
| + bot.add(check); |
| + bot.add(buttonrow); |
| + |
| + /* now arrange things inside the dialog: */ |
| + dialog.setLayout(new BorderLayout()); |
| + |
| + dialog.add("North", label); |
| + dialog.add("South", bot); |
| + dialog.add("Center", textarea); |
| + |
| + dialog.pack(); |
| + dialog.resize(dialog.preferredSize()); |
| + |
| + dialog.show(); /* block here til OK or Cancel pressed. */ |
| + |
| + return trust_this_session; |
| + } |
| + |
| + public synchronized void actionPerformed(ActionEvent evt) { |
| + |
| + if (evt.getSource() == viewcert) { |
| + /* View Certificate button clicked */ |
| + if (viewing_cert) { |
| + /* show the original info text: */ |
| + textarea.setText(text); |
| + viewcert.setLabel("View Certificate"); |
| + viewing_cert = false; |
| + } else { |
| + int i; |
| + /* show all (likely just one) certs: */ |
| + textarea.setText(""); |
| + for (i=0; i < trustallCerts.length; i++) { |
| + int j = i + 1; |
| + textarea.append("Certificate[" + |
| + j + "]\n\n"); |
| + textarea.append( |
| + trustallCerts[i].toString()); |
| + textarea.append(ln); |
| + } |
| + viewcert.setLabel("View Info"); |
| + viewing_cert = true; |
| + |
| + textarea.setCaretPosition(0); |
| + } |
| + |
| + } else if (evt.getSource() == ok) { |
| + /* OK button clicked */ |
| + if (accept.getState()) { |
| + trust_this_session = true; |
| + } else { |
| + trust_this_session = false; |
| + } |
| + //dialog.dispose(); |
| + dialog.hide(); |
| + |
| + } else if (evt.getSource() == cancel) { |
| + /* Cancel button clicked */ |
| + trust_this_session = false; |
| + |
| + //dialog.dispose(); |
| + dialog.hide(); |
| + } |
| + } |
| + |
| + String get_certinfo() { |
| + String all = ""; |
| + String fields[] = {"CN", "OU", "O", "L", "C"}; |
| + int i; |
| + if (trustallCerts.length < 1) { |
| + all = ""; |
| + return all; |
| + } |
| + String cert = trustallCerts[0].toString(); |
| + |
| + /* |
| + * For now we simply scrape the cert string, there must |
| + * be an API for this... perhaps optionValue? |
| + */ |
| + |
| + for (i=0; i < fields.length; i++) { |
| + int f, t, t1, t2; |
| + String sub, mat = fields[i] + "="; |
| + |
| + f = cert.indexOf(mat, 0); |
| + if (f > 0) { |
| + t1 = cert.indexOf(", ", f); |
| + t2 = cert.indexOf("\n", f); |
| + if (t1 < 0 && t2 < 0) { |
| + continue; |
| + } else if (t1 < 0) { |
| + t = t2; |
| + } else if (t2 < 0) { |
| + t = t1; |
| + } else if (t1 < t2) { |
| + t = t1; |
| + } else { |
| + t = t2; |
| + } |
| + if (t > f) { |
| + sub = cert.substring(f, t); |
| + all = all + " " + sub + "\n"; |
| + } |
| + } |
| + } |
| + return all; |
| + } |
| +} |
| + |
| +class ProxyDialog implements ActionListener { |
| + String guessedHost = null; |
| + String guessedPort = null; |
| + /* |
| + * this is the gui to show the user the cert and info and ask |
| + * them if they want to continue using this cert. |
| + */ |
| + |
| + Button ok; |
| + Dialog dialog; |
| + TextField entry; |
| + String reply = ""; |
| + |
| + ProxyDialog (String h, int p) { |
| + guessedHost = h; |
| + try { |
| + guessedPort = Integer.toString(p); |
| + } catch (Exception e) { |
| + guessedPort = "8080"; |
| + } |
| + } |
| + |
| + public void queryUser() { |
| + |
| + /* create and display the dialog for unverified cert. */ |
| + |
| + Frame frame = new Frame("Need Proxy host:port"); |
| + |
| + dialog = new Dialog(frame, true); |
| + |
| + |
| + Label label = new Label("Please Enter your https Proxy info as host:port", Label.CENTER); |
| + //label.setFont(new Font("Helvetica", Font.BOLD, 16)); |
| + entry = new TextField(30); |
| + ok = new Button("OK"); |
| + ok.addActionListener(this); |
| + |
| + String guess = ""; |
| + if (guessedHost != null) { |
| + guess = guessedHost + ":" + guessedPort; |
| + } |
| + entry.setText(guess); |
| + |
| + dialog.setLayout(new BorderLayout()); |
| + dialog.add("North", label); |
| + dialog.add("Center", entry); |
| + dialog.add("South", ok); |
| + dialog.pack(); |
| + dialog.resize(dialog.preferredSize()); |
| + |
| + dialog.show(); /* block here til OK or Cancel pressed. */ |
| + return; |
| + } |
| + |
| + public String getHost() { |
| + int i = reply.indexOf(":"); |
| + if (i < 0) { |
| + return "unknown"; |
| + } |
| + String h = reply.substring(0, i); |
| + return h; |
| + } |
| + |
| + public int getPort() { |
| + int i = reply.indexOf(":"); |
| + int p = 8080; |
| + if (i < 0) { |
| + return p; |
| + } |
| + i++; |
| + String ps = reply.substring(i); |
| + try { |
| + Integer I = new Integer(ps); |
| + p = I.intValue(); |
| + } catch (Exception e) { |
| + ; |
| + } |
| + return p; |
| + } |
| + |
| + public synchronized void actionPerformed(ActionEvent evt) { |
| + System.out.println(evt.getActionCommand()); |
| + if (evt.getSource() == ok) { |
| + reply = entry.getText(); |
| + //dialog.dispose(); |
| + dialog.hide(); |
| + } |
| + } |
| +} |
| + |
| +class ProxyPasswdDialog implements ActionListener { |
| + String guessedHost = null; |
| + String guessedPort = null; |
| + String guessedUser = null; |
| + String guessedPasswd = null; |
| + String realm = null; |
| + /* |
| + * this is the gui to show the user the cert and info and ask |
| + * them if they want to continue using this cert. |
| + */ |
| + |
| + Button ok; |
| + Dialog dialog; |
| + TextField entry1; |
| + TextField entry2; |
| + String reply1 = ""; |
| + String reply2 = ""; |
| + |
| + ProxyPasswdDialog (String h, int p, String realm) { |
| + guessedHost = h; |
| + try { |
| + guessedPort = Integer.toString(p); |
| + } catch (Exception e) { |
| + guessedPort = "8080"; |
| + } |
| + this.realm = realm; |
| + } |
| + |
| + public void queryUser() { |
| + |
| + /* create and display the dialog for unverified cert. */ |
| + |
| + Frame frame = new Frame("Proxy Requires Username and Password"); |
| + |
| + dialog = new Dialog(frame, true); |
| + |
| + //Label label = new Label("Please Enter your Web Proxy Username in the top Entry and Password in the bottom Entry", Label.CENTER); |
| + TextArea label = new TextArea("Please Enter your Web Proxy\nUsername in the Top Entry and\nPassword in the Bottom Entry,\nand then press OK.", 4, 20, TextArea.SCROLLBARS_NONE); |
| + entry1 = new TextField(30); |
| + entry2 = new TextField(30); |
| + entry2.setEchoChar('*'); |
| + ok = new Button("OK"); |
| + ok.addActionListener(this); |
| + |
| + dialog.setLayout(new BorderLayout()); |
| + dialog.add("North", label); |
| + dialog.add("Center", entry1); |
| + dialog.add("South", entry2); |
| + dialog.add("East", ok); |
| + dialog.pack(); |
| + dialog.resize(dialog.preferredSize()); |
| + |
| + dialog.show(); /* block here til OK or Cancel pressed. */ |
| + return; |
| + } |
| + |
| + public String getAuth() { |
| + return reply1 + ":" + reply2; |
| + } |
| + |
| + public synchronized void actionPerformed(ActionEvent evt) { |
| + System.out.println(evt.getActionCommand()); |
| + if (evt.getSource() == ok) { |
| + reply1 = entry1.getText(); |
| + reply2 = entry2.getText(); |
| + //dialog.dispose(); |
| + dialog.hide(); |
| + } |
| + } |
| +} |
| + |
| +class ClientCertDialog implements ActionListener { |
| + |
| + Button ok; |
| + Dialog dialog; |
| + TextField entry; |
| + String reply = ""; |
| + |
| + ClientCertDialog() { |
| + ; |
| + } |
| + |
| + public String queryUser() { |
| + |
| + /* create and display the dialog for unverified cert. */ |
| + |
| + Frame frame = new Frame("Enter SSL Client Cert+Key String"); |
| + |
| + dialog = new Dialog(frame, true); |
| + |
| + |
| + Label label = new Label("Please Enter the SSL Client Cert+Key String 308204c0...,...522d2d0a", Label.CENTER); |
| + entry = new TextField(30); |
| + ok = new Button("OK"); |
| + ok.addActionListener(this); |
| + |
| + dialog.setLayout(new BorderLayout()); |
| + dialog.add("North", label); |
| + dialog.add("Center", entry); |
| + dialog.add("South", ok); |
| + dialog.pack(); |
| + dialog.resize(dialog.preferredSize()); |
| + |
| + dialog.show(); /* block here til OK or Cancel pressed. */ |
| + return reply; |
| + } |
| + |
| + public synchronized void actionPerformed(ActionEvent evt) { |
| + System.out.println(evt.getActionCommand()); |
| + if (evt.getSource() == ok) { |
| + reply = entry.getText(); |
| + //dialog.dispose(); |
| + dialog.hide(); |
| + } |
| + } |
| +} |
| + |
| +class BrowserCertsDialog implements ActionListener { |
| + Button yes, no; |
| + Dialog dialog; |
| + String vncServer; |
| + String hostport; |
| + public boolean showCertDialog = true; |
| + |
| + BrowserCertsDialog(String serv, String hp) { |
| + vncServer = serv; |
| + hostport = hp; |
| + } |
| + |
| + public void queryUser() { |
| + |
| + /* create and display the dialog for unverified cert. */ |
| + |
| + Frame frame = new Frame("Use Browser/JVM Certs?"); |
| + |
| + dialog = new Dialog(frame, true); |
| + |
| + String m = ""; |
| +m += "\n"; |
| +m += "This VNC Viewer applet does not have its own keystore to track\n"; |
| +m += "SSL certificates, and so cannot authenticate the certificate\n"; |
| +m += "of the VNC Server:\n"; |
| +m += "\n"; |
| +m += " " + hostport + "\n\n " + vncServer + "\n"; |
| +m += "\n"; |
| +m += "on its own.\n"; |
| +m += "\n"; |
| +m += "However, it has noticed that your Web Browser and/or Java VM Plugin\n"; |
| +m += "has previously accepted the same certificate. You may have set\n"; |
| +m += "this up permanently or just for this session, or the server\n"; |
| +m += "certificate was signed by a CA cert that your Web Browser or\n"; |
| +m += "Java VM Plugin has.\n"; |
| +m += "\n"; |
| +m += "If the VNC Server connection times out while you are reading this\n"; |
| +m += "dialog, then restart the connection and try again.\n"; |
| +m += "\n"; |
| +m += "Should this VNC Viewer applet now connect to the above VNC server?\n"; |
| +m += "\n"; |
| + |
| + TextArea textarea = new TextArea(m, 22, 64, |
| + TextArea.SCROLLBARS_VERTICAL_ONLY); |
| + textarea.setEditable(false); |
| + yes = new Button("Yes"); |
| + yes.addActionListener(this); |
| + no = new Button("No, Let Me See the Certificate."); |
| + no.addActionListener(this); |
| + |
| + dialog.setLayout(new BorderLayout()); |
| + dialog.add("North", textarea); |
| + dialog.add("Center", yes); |
| + dialog.add("South", no); |
| + dialog.pack(); |
| + dialog.resize(dialog.preferredSize()); |
| + |
| + dialog.show(); /* block here til Yes or No pressed. */ |
| + System.out.println("done show()"); |
| + return; |
| + } |
| + |
| + public synchronized void actionPerformed(ActionEvent evt) { |
| + System.out.println(evt.getActionCommand()); |
| + if (evt.getSource() == yes) { |
| + showCertDialog = false; |
| + //dialog.dispose(); |
| + dialog.hide(); |
| + } else if (evt.getSource() == no) { |
| + showCertDialog = true; |
| + //dialog.dispose(); |
| + dialog.hide(); |
| + } |
| + System.out.println("done actionPerformed()"); |
| + } |
| +} |
| + |
| +class CertInfo { |
| + String fields[] = {"CN", "OU", "O", "L", "C"}; |
| + java.security.cert.Certificate cert; |
| + String certString = ""; |
| + |
| + CertInfo(java.security.cert.Certificate c) { |
| + cert = c; |
| + certString = cert.toString(); |
| + } |
| + |
| + String get_certinfo(String which) { |
| + int i; |
| + String cs = new String(certString); |
| + String all = ""; |
| + |
| + /* |
| + * For now we simply scrape the cert string, there must |
| + * be an API for this... perhaps optionValue? |
| + */ |
| + for (i=0; i < fields.length; i++) { |
| + int f, t, t1, t2; |
| + String sub, mat = fields[i] + "="; |
| + |
| + f = cs.indexOf(mat, 0); |
| + if (f > 0) { |
| + t1 = cs.indexOf(", ", f); |
| + t2 = cs.indexOf("\n", f); |
| + if (t1 < 0 && t2 < 0) { |
| + continue; |
| + } else if (t1 < 0) { |
| + t = t2; |
| + } else if (t2 < 0) { |
| + t = t1; |
| + } else if (t1 < t2) { |
| + t = t1; |
| + } else { |
| + t = t2; |
| + } |
| + if (t > f) { |
| + sub = cs.substring(f, t); |
| + all = all + " " + sub + "\n"; |
| + if (which.equals(fields[i])) { |
| + return sub; |
| + } |
| + } |
| + } |
| + } |
| + if (which.equals("all")) { |
| + return all; |
| + } else { |
| + return ""; |
| + } |
| + } |
| +} |
| + |
| +class Base64Coder { |
| + |
| + // Mapping table from 6-bit nibbles to Base64 characters. |
| + private static char[] map1 = new char[64]; |
| + static { |
| + int i=0; |
| + for (char c='A'; c<='Z'; c++) map1[i++] = c; |
| + for (char c='a'; c<='z'; c++) map1[i++] = c; |
| + for (char c='0'; c<='9'; c++) map1[i++] = c; |
| + map1[i++] = '+'; map1[i++] = '/'; } |
| + |
| + // Mapping table from Base64 characters to 6-bit nibbles. |
| + private static byte[] map2 = new byte[128]; |
| + static { |
| + for (int i=0; i<map2.length; i++) map2[i] = -1; |
| + for (int i=0; i<64; i++) map2[map1[i]] = (byte)i; } |
| + |
| + /** |
| + * Encodes a string into Base64 format. |
| + * No blanks or line breaks are inserted. |
| + * @param s a String to be encoded. |
| + * @return A String with the Base64 encoded data. |
| + */ |
| + public static String encodeString (String s) { |
| + return new String(encode(s.getBytes())); } |
| + |
| + /** |
| + * Encodes a byte array into Base64 format. |
| + * No blanks or line breaks are inserted. |
| + * @param in an array containing the data bytes to be encoded. |
| + * @return A character array with the Base64 encoded data. |
| + */ |
| + public static char[] encode (byte[] in) { |
| + return encode(in,in.length); } |
| + |
| + /** |
| + * Encodes a byte array into Base64 format. |
| + * No blanks or line breaks are inserted. |
| + * @param in an array containing the data bytes to be encoded. |
| + * @param iLen number of bytes to process in <code>in</code>. |
| + * @return A character array with the Base64 encoded data. |
| + */ |
| + public static char[] encode (byte[] in, int iLen) { |
| + int oDataLen = (iLen*4+2)/3; // output length without padding |
| + int oLen = ((iLen+2)/3)*4; // output length including padding |
| + char[] out = new char[oLen]; |
| + int ip = 0; |
| + int op = 0; |
| + while (ip < iLen) { |
| + int i0 = in[ip++] & 0xff; |
| + int i1 = ip < iLen ? in[ip++] & 0xff : 0; |
| + int i2 = ip < iLen ? in[ip++] & 0xff : 0; |
| + int o0 = i0 >>> 2; |
| + int o1 = ((i0 & 3) << 4) | (i1 >>> 4); |
| + int o2 = ((i1 & 0xf) << 2) | (i2 >>> 6); |
| + int o3 = i2 & 0x3F; |
| + out[op++] = map1[o0]; |
| + out[op++] = map1[o1]; |
| + out[op] = op < oDataLen ? map1[o2] : '='; op++; |
| + out[op] = op < oDataLen ? map1[o3] : '='; op++; } |
| + return out; } |
| + |
| + /** |
| + * Decodes a string from Base64 format. |
| + * @param s a Base64 String to be decoded. |
| + * @return A String containing the decoded data. |
| + * @throws IllegalArgumentException if the input is not valid Base64 encoded data. |
| + */ |
| + public static String decodeString (String s) { |
| + return new String(decode(s)); } |
| + |
| + /** |
| + * Decodes a byte array from Base64 format. |
| + * @param s a Base64 String to be decoded. |
| + * @return An array containing the decoded data bytes. |
| + * @throws IllegalArgumentException if the input is not valid Base64 encoded data. |
| + */ |
| + public static byte[] decode (String s) { |
| + return decode(s.toCharArray()); } |
| + |
| + /** |
| + * Decodes a byte array from Base64 format. |
| + * No blanks or line breaks are allowed within the Base64 encoded data. |
| + * @param in a character array containing the Base64 encoded data. |
| + * @return An array containing the decoded data bytes. |
| + * @throws IllegalArgumentException if the input is not valid Base64 encoded data. |
| + */ |
| + public static byte[] decode (char[] in) { |
| + int iLen = in.length; |
| + if (iLen%4 != 0) throw new IllegalArgumentException ("Length of Base64 encoded input string is not a multiple of 4."); |
| + while (iLen > 0 && in[iLen-1] == '=') iLen--; |
| + int oLen = (iLen*3) / 4; |
| + byte[] out = new byte[oLen]; |
| + int ip = 0; |
| + int op = 0; |
| + while (ip < iLen) { |
| + int i0 = in[ip++]; |
| + int i1 = in[ip++]; |
| + int i2 = ip < iLen ? in[ip++] : 'A'; |
| + int i3 = ip < iLen ? in[ip++] : 'A'; |
| + if (i0 > 127 || i1 > 127 || i2 > 127 || i3 > 127) |
| + throw new IllegalArgumentException ("Illegal character in Base64 encoded data."); |
| + int b0 = map2[i0]; |
| + int b1 = map2[i1]; |
| + int b2 = map2[i2]; |
| + int b3 = map2[i3]; |
| + if (b0 < 0 || b1 < 0 || b2 < 0 || b3 < 0) |
| + throw new IllegalArgumentException ("Illegal character in Base64 encoded data."); |
| + int o0 = ( b0 <<2) | (b1>>>4); |
| + int o1 = ((b1 & 0xf)<<4) | (b2>>>2); |
| + int o2 = ((b2 & 3)<<6) | b3; |
| + out[op++] = (byte)o0; |
| + if (op<oLen) out[op++] = (byte)o1; |
| + if (op<oLen) out[op++] = (byte)o2; } |
| + return out; } |
| + |
| + // Dummy constructor. |
| + private Base64Coder() {} |
| + |
| +} |
| diff -Naur JavaViewer.orig/VncCanvas.java JavaViewer/VncCanvas.java |
| --- JavaViewer.orig/VncCanvas.java 2005-11-21 18:50:18.000000000 -0500 |
| +++ JavaViewer/VncCanvas.java 2010-11-30 22:57:50.000000000 -0500 |
| @@ -27,6 +27,13 @@ |
| import java.lang.*; |
| import java.util.zip.*; |
| |
| +// begin runge/x11vnc |
| +import java.util.Collections; |
| +// end runge/x11vnc |
| + |
| +// begin runge/x11vnc |
| +// all the MouseWheel stuff below. |
| +// end runge/x11vnc |
| |
| // |
| // VncCanvas is a subclass of Canvas which draws a VNC desktop on it. |
| @@ -34,7 +41,7 @@ |
| |
| class VncCanvas |
| extends Canvas |
| - implements KeyListener, MouseListener, MouseMotionListener { |
| + implements KeyListener, MouseListener, MouseMotionListener, MouseWheelListener { |
| |
| VncViewer viewer; |
| RfbProto rfb; |
| @@ -85,6 +92,22 @@ |
| |
| cm24 = new DirectColorModel(24, 0xFF0000, 0x00FF00, 0x0000FF); |
| |
| +// begin runge/x11vnc |
| +// kludge to not show any Java cursor in the canvas since we are |
| +// showing the soft cursor (should be a user setting...) |
| +Cursor dot = Toolkit.getDefaultToolkit().createCustomCursor( |
| + Toolkit.getDefaultToolkit().createImage(new byte[4]), new Point(0,0), |
| + "dot"); |
| +this.setCursor(dot); |
| + |
| +// while we are at it... get rid of the keyboard traversals that |
| +// make it so we can't type a Tab character: |
| +this.setFocusTraversalKeys(KeyboardFocusManager.FORWARD_TRAVERSAL_KEYS, |
| + Collections.EMPTY_SET); |
| +this.setFocusTraversalKeys(KeyboardFocusManager.BACKWARD_TRAVERSAL_KEYS, |
| + Collections.EMPTY_SET); |
| +// end runge/x11vnc |
| + |
| colors = new Color[256]; |
| // sf@2005 - Now Default |
| for (int i = 0; i < 256; i++) |
| @@ -186,6 +209,7 @@ |
| inputEnabled = true; |
| addMouseListener(this); |
| addMouseMotionListener(this); |
| + addMouseWheelListener(this); |
| if (viewer.showControls) { |
| viewer.buttonPanel.enableRemoteAccessControls(true); |
| } |
| @@ -193,6 +217,7 @@ |
| inputEnabled = false; |
| removeMouseListener(this); |
| removeMouseMotionListener(this); |
| + removeMouseWheelListener(this); |
| if (viewer.showControls) { |
| viewer.buttonPanel.enableRemoteAccessControls(false); |
| } |
| @@ -202,6 +227,9 @@ |
| |
| public void setPixelFormat() throws IOException { |
| // sf@2005 - Adding more color modes |
| + if (viewer.graftFtp) { |
| + return; |
| + } |
| if (viewer.options.eightBitColors > 0) |
| { |
| viewer.options.oldEightBitColors = viewer.options.eightBitColors; |
| @@ -237,6 +265,9 @@ |
| } |
| else |
| { |
| +// begin runge/x11vnc |
| + viewer.options.oldEightBitColors = viewer.options.eightBitColors; |
| +// end runge/x11vnc |
| rfb.writeSetPixelFormat( |
| 32, |
| 24, |
| @@ -376,12 +407,14 @@ |
| // Start/stop session recording if necessary. |
| viewer.checkRecordingStatus(); |
| |
| - rfb.writeFramebufferUpdateRequest( |
| - 0, |
| - 0, |
| - rfb.framebufferWidth, |
| - rfb.framebufferHeight, |
| - false); |
| + if (!viewer.graftFtp) { |
| + rfb.writeFramebufferUpdateRequest( |
| + 0, |
| + 0, |
| + rfb.framebufferWidth, |
| + rfb.framebufferHeight, |
| + false); |
| + } |
| |
| // |
| // main dispatch loop |
| @@ -390,6 +423,9 @@ |
| while (true) { |
| // Read message type from the server. |
| int msgType = rfb.readServerMessageType(); |
| + if (viewer.ftpOnly && msgType != RfbProto.rfbFileTransfer) { |
| + System.out.println("msgType:" + msgType); |
| + } |
| |
| // Process the message depending on its type. |
| switch (msgType) { |
| @@ -1332,6 +1368,9 @@ |
| public void mouseDragged(MouseEvent evt) { |
| processLocalMouseEvent(evt, true); |
| } |
| + public void mouseWheelMoved(MouseWheelEvent evt) { |
| + processLocalMouseWheelEvent(evt); |
| + } |
| |
| public void processLocalKeyEvent(KeyEvent evt) { |
| if (viewer.rfb != null && rfb.inNormalProtocol) { |
| @@ -1367,6 +1406,19 @@ |
| evt.consume(); |
| } |
| |
| + public void processLocalMouseWheelEvent(MouseWheelEvent evt) { |
| + if (viewer.rfb != null && rfb.inNormalProtocol) { |
| + synchronized(rfb) { |
| + try { |
| + rfb.writeWheelEvent(evt); |
| + } catch (Exception e) { |
| + e.printStackTrace(); |
| + } |
| + rfb.notify(); |
| + } |
| + } |
| + } |
| + |
| public void processLocalMouseEvent(MouseEvent evt, boolean moved) { |
| if (viewer.rfb != null && rfb.inNormalProtocol) { |
| if (moved) { |
| @@ -1532,9 +1584,14 @@ |
| else |
| { |
| result = |
| - 0xFF000000 | (pixBuf[i * 4 + 1] & 0xFF) |
| - << 16 | (pixBuf[i * 4 + 2] & 0xFF) |
| - << 8 | (pixBuf[i * 4 + 3] & 0xFF); |
| +// begin runge/x11vnc |
| +// 0xFF000000 | (pixBuf[i * 4 + 1] & 0xFF) |
| +// << 16 | (pixBuf[i * 4 + 2] & 0xFF) |
| +// << 8 | (pixBuf[i * 4 + 3] & 0xFF); |
| + 0xFF000000 | (pixBuf[i * 4 + 2] & 0xFF) |
| + << 16 | (pixBuf[i * 4 + 1] & 0xFF) |
| + << 8 | (pixBuf[i * 4 + 0] & 0xFF); |
| +// end runge/x11vnc |
| } |
| } else { |
| result = 0; // Transparent pixel |
| @@ -1565,9 +1622,14 @@ |
| else |
| { |
| result = |
| - 0xFF000000 | (pixBuf[i * 4 + 1] & 0xFF) |
| - << 16 | (pixBuf[i * 4 + 2] & 0xFF) |
| - << 8 | (pixBuf[i * 4 + 3] & 0xFF); |
| +// begin runge/x11vnc |
| +// 0xFF000000 | (pixBuf[i * 4 + 1] & 0xFF) |
| +// << 16 | (pixBuf[i * 4 + 2] & 0xFF) |
| +// << 8 | (pixBuf[i * 4 + 3] & 0xFF); |
| + 0xFF000000 | (pixBuf[i * 4 + 2] & 0xFF) |
| + << 16 | (pixBuf[i * 4 + 1] & 0xFF) |
| + << 8 | (pixBuf[i * 4 + 0] & 0xFF); |
| +// end runge/x11vnc |
| } |
| } else { |
| result = 0; // Transparent pixel |
| diff -Naur JavaViewer.orig/VncViewer.java JavaViewer/VncViewer.java |
| --- JavaViewer.orig/VncViewer.java 2006-05-24 15:14:40.000000000 -0400 |
| +++ JavaViewer/VncViewer.java 2010-03-27 18:00:28.000000000 -0400 |
| @@ -41,6 +41,7 @@ |
| import java.io.*; |
| import java.net.*; |
| import javax.swing.*; |
| +import java.util.Date; |
| |
| public class VncViewer extends java.applet.Applet |
| implements java.lang.Runnable, WindowListener { |
| @@ -80,11 +81,11 @@ |
| GridBagLayout gridbag; |
| ButtonPanel buttonPanel; |
| AuthPanel authenticator; |
| - VncCanvas vc; |
| + VncCanvas vc = null; |
| OptionsFrame options; |
| ClipboardFrame clipboard; |
| RecordingFrame rec; |
| - FTPFrame ftp; // KMC: FTP Frame declaration |
| + FTPFrame ftp = null; // KMC: FTP Frame declaration |
| |
| // Control session recording. |
| Object recordingSync; |
| @@ -96,7 +97,7 @@ |
| |
| // Variables read from parameter values. |
| String host; |
| - int port; |
| + int port, vncserverport; |
| String passwordParam; |
| String encPasswordParam; |
| boolean showControls; |
| @@ -115,28 +116,75 @@ |
| int i; |
| // mslogon support 2 end |
| |
| +// begin runge/x11vnc |
| +boolean disableSSL; |
| +boolean GET; |
| +String CONNECT; |
| +String urlPrefix; |
| +String httpsPort; |
| +String oneTimeKey; |
| +String serverCert; |
| +String ftpDropDown; |
| +String proxyHost; |
| +String proxyPort; |
| +boolean forceProxy; |
| +boolean ignoreProxy; |
| +boolean trustAllVncCerts; |
| +boolean trustUrlVncCert; |
| +boolean debugCerts; |
| +boolean debugKeyboard; |
| +boolean mapF5_to_atsign; |
| +boolean forbid_Ctrl_Alt; |
| + |
| +boolean ignoreMSLogonCheck; |
| +boolean delayAuthPanel; |
| +boolean ftpOnly; |
| +boolean graftFtp; |
| +boolean dsmActive; |
| + |
| +boolean gotAuth; |
| +int authGot; |
| +// end runge/x11vnc |
| + |
| + |
| // |
| // init() |
| // |
| |
| +public void ftp_init() { |
| + boolean show = false; |
| + if (ftp != null) { |
| + show = true; |
| + } |
| + ftp = null; |
| + |
| + ftp = new FTPFrame(this); // KMC: FTPFrame creation |
| + |
| + if (show) { |
| + ftp.doOpen(); |
| + rfb.readServerDriveList(); |
| + } |
| +} |
| + |
| public void init() { |
| |
| readParameters(); |
| |
| if (inSeparateFrame) { |
| - vncFrame = new Frame("Ultr@VNC"); |
| - if (!inAnApplet) { |
| - vncFrame.add("Center", this); |
| - } |
| - vncContainer = vncFrame; |
| + vncFrame = new Frame("Ultr@VNC"); |
| + if (!inAnApplet) { |
| + vncFrame.add("Center", this); |
| + } |
| + vncContainer = vncFrame; |
| } else { |
| - vncContainer = this; |
| + vncContainer = this; |
| } |
| |
| recordingSync = new Object(); |
| |
| options = new OptionsFrame(this); |
| clipboard = new ClipboardFrame(this); |
| + |
| // authenticator = new AuthPanel(false); // mslogon support : go to connectAndAuthenticate() |
| if (RecordingFrame.checkSecurity()) |
| rec = new RecordingFrame(this); |
| @@ -147,10 +195,11 @@ |
| cursorUpdatesDef = null; |
| eightBitColorsDef = null; |
| |
| - if (inSeparateFrame) |
| + if (inSeparateFrame && vncFrame != null) |
| vncFrame.addWindowListener(this); |
| |
| - ftp = new FTPFrame(this); // KMC: FTPFrame creation |
| + ftp_init(); |
| + |
| rfbThread = new Thread(this); |
| rfbThread.start(); |
| } |
| @@ -186,6 +235,30 @@ |
| gbc.weightx = 1.0; |
| gbc.weighty = 1.0; |
| |
| + if (ftpOnly) { |
| + if (showControls) { |
| + buttonPanel.enableButtons(); |
| + } |
| + ActionListener taskPerformer = new ActionListener() { |
| + public void actionPerformed(ActionEvent evt) { |
| + vncFrame.setVisible(false); |
| + ftp.setSavedLocations(); |
| + if (ftp.isVisible()) { |
| + ftp.doClose(); |
| + } else { |
| + ftp.doOpen(); |
| + } |
| + rfb.readServerDriveList(); |
| + } |
| + }; |
| + Timer t = new Timer(300, taskPerformer); |
| + t.setRepeats(false); |
| + t.start(); |
| + |
| + vc.processNormalProtocol(); |
| + return; |
| + } |
| + |
| // Add ScrollPanel to applet mode |
| |
| // Create a panel which itself is resizeable and can hold |
| @@ -286,6 +359,24 @@ |
| |
| void connectAndAuthenticate() throws Exception { |
| |
| + if (graftFtp) { |
| + rfb = new RfbProto(host, port, this); |
| + rfb.desktopName = "ftponly"; |
| + rfb.framebufferWidth = 12; |
| + rfb.framebufferHeight = 12; |
| + rfb.bitsPerPixel = 32; |
| + rfb.depth = 24; |
| + rfb.trueColour = true; |
| + rfb.redMax = 255; |
| + rfb.greenMax = 255; |
| + rfb.blueMax = 255; |
| + rfb.redShift = 16; |
| + rfb.greenShift = 8; |
| + rfb.blueShift = 0; |
| + rfb.inNormalProtocol = true; |
| + return; |
| + } |
| + |
| // If "ENCPASSWORD" parameter is set, decrypt the password into |
| // the passwordParam string. |
| |
| @@ -336,7 +427,22 @@ |
| // |
| |
| |
| - prologueDetectAuthProtocol() ; |
| +// begin runge/x11vnc |
| + gotAuth = false; |
| + if (delayAuthPanel) { |
| + if (tryAuthenticate(null, null)) { |
| + if (inSeparateFrame) { |
| + vncFrame.pack(); |
| + vncFrame.show(); |
| + } |
| + return; |
| + } |
| + } |
| +// prologueDetectAuthProtocol() ; |
| + if (ignoreMSLogonCheck == false) { |
| + prologueDetectAuthProtocol() ; |
| + } |
| +// end runge/x11vnc |
| |
| authenticator = new AuthPanel(mslogon); |
| |
| @@ -371,6 +477,7 @@ |
| //mslogon support end |
| } |
| |
| + int tries = 0; |
| while (true) { |
| // Wait for user entering a password, or a username and a password |
| synchronized(authenticator) { |
| @@ -390,6 +497,13 @@ |
| break; |
| //mslogon support end |
| |
| +// begin runge/x11vnc |
| + gotAuth = false; |
| + if (++tries > 2) { |
| + throw new Exception("Incorrect password entered " + tries + " times."); |
| + } |
| +// end runge/x11vnc |
| + |
| // Retry on authentication failure. |
| authenticator.retry(); |
| } |
| @@ -405,9 +519,11 @@ |
| |
| void prologueDetectAuthProtocol() throws Exception { |
| |
| - rfb = new RfbProto(host, port, this); |
| + if (!gotAuth) { |
| + rfb = new RfbProto(host, port, this); |
| |
| - rfb.readVersionMsg(); |
| + rfb.readVersionMsg(); |
| + } |
| |
| System.out.println("RFB server supports protocol version " + |
| rfb.serverMajor + "." + rfb.serverMinor); |
| @@ -431,16 +547,36 @@ |
| |
| boolean tryAuthenticate(String us, String pw) throws Exception { |
| |
| - rfb = new RfbProto(host, port, this); |
| + int authScheme; |
| |
| - rfb.readVersionMsg(); |
| + if (!gotAuth) { |
| + rfb = new RfbProto(host, port, this); |
| |
| - System.out.println("RFB server supports protocol version " + |
| - rfb.serverMajor + "." + rfb.serverMinor); |
| + rfb.readVersionMsg(); |
| |
| - rfb.writeVersionMsg(); |
| + System.out.println("RFB server supports protocol version: " + |
| + rfb.serverMajor + "." + rfb.serverMinor); |
| |
| - int authScheme = rfb.readAuthScheme(); |
| + rfb.writeVersionMsg(); |
| + |
| + authScheme = rfb.readAuthScheme(); |
| + |
| + gotAuth = true; |
| + authGot = authScheme; |
| + } else { |
| + authScheme = authGot; |
| + } |
| +// begin runge/x11vnc |
| + if (delayAuthPanel && pw == null) { |
| + if (authScheme == RfbProto.NoAuth) { |
| + System.out.println("No authentication needed"); |
| + return true; |
| + } else { |
| + return false; |
| + } |
| + } |
| +System.out.println("as: " + authScheme); |
| +// end runge/x11vnc |
| |
| switch (authScheme) { |
| |
| @@ -629,6 +765,10 @@ |
| |
| void doProtocolInitialisation() throws IOException { |
| |
| + if (graftFtp) { |
| + return; |
| + } |
| + |
| rfb.writeClientInit(); |
| |
| rfb.readServerInit(); |
| @@ -774,9 +914,28 @@ |
| fatalError("HOST parameter not specified"); |
| } |
| } |
| + Date d = new Date(); |
| + System.out.println("-\nSSL VNC Java Applet starting. " + d); |
| |
| - String str = readParameter("PORT", true); |
| - port = Integer.parseInt(str); |
| + port = 0; |
| + String str = readParameter("PORT", false); |
| + if (str != null) { |
| + port = Integer.parseInt(str); |
| + } |
| + // When there is a proxy VNCSERVERPORT may be inaccessible (inside firewall). |
| + vncserverport = 0; |
| + str = readParameter("VNCSERVERPORT", false); |
| + if (str != null) { |
| + vncserverport = Integer.parseInt(str); |
| + } |
| + if (port == 0 && vncserverport == 0) { |
| + fatalError("Neither PORT nor VNCSERVERPORT parameters specified"); |
| + } |
| + if (port == 0) { |
| + // Nevertheless, fall back to vncserverport if we have to. |
| + System.out.println("using vncserverport: '" + vncserverport + "' for PORT."); |
| + port = vncserverport; |
| + } |
| |
| if (inAnApplet) { |
| str = readParameter("Open New Window", false); |
| @@ -804,6 +963,158 @@ |
| deferScreenUpdates = readIntParameter("Defer screen updates", 20); |
| deferCursorUpdates = readIntParameter("Defer cursor updates", 10); |
| deferUpdateRequests = readIntParameter("Defer update requests", 50); |
| + |
| +// begin runge/x11vnc |
| + // SSL |
| + disableSSL = false; |
| + str = readParameter("DisableSSL", false); |
| + if (str != null && str.equalsIgnoreCase("Yes")) |
| + disableSSL = true; |
| + |
| + httpsPort = readParameter("httpsPort", false); |
| + |
| + // Extra GET, CONNECT string: |
| + CONNECT = readParameter("CONNECT", false); |
| + if (CONNECT != null) { |
| + CONNECT = CONNECT.replaceAll(" ", ":"); |
| + } |
| + |
| + GET = false; |
| + str = readParameter("GET", false); |
| + if (str != null && str.equalsIgnoreCase("Yes")) { |
| + GET = true; |
| + } |
| + if (str != null && str.equalsIgnoreCase("1")) { |
| + GET = true; |
| + } |
| + |
| + urlPrefix = readParameter("urlPrefix", false); |
| + if (urlPrefix != null) { |
| + urlPrefix = urlPrefix.replaceAll("%2F", "/"); |
| + urlPrefix = urlPrefix.replaceAll("%2f", "/"); |
| + urlPrefix = urlPrefix.replaceAll("_2F_", "/"); |
| + if (urlPrefix.indexOf("/") != 0) { |
| + urlPrefix = "/" + urlPrefix; |
| + } |
| + } else { |
| + urlPrefix = ""; |
| + } |
| + System.out.println("urlPrefix: '" + urlPrefix + "'"); |
| + |
| + ftpDropDown = readParameter("ftpDropDown", false); |
| + if (ftpDropDown != null) { |
| + ftpDropDown = ftpDropDown.replaceAll("%2F", "/"); |
| + ftpDropDown = ftpDropDown.replaceAll("%2f", "/"); |
| + ftpDropDown = ftpDropDown.replaceAll("_2F_", "/"); |
| + ftpDropDown = ftpDropDown.replaceAll("%20", " "); |
| + System.out.println("ftpDropDown: '" + ftpDropDown + "'"); |
| + } |
| + |
| + |
| + oneTimeKey = readParameter("oneTimeKey", false); |
| + if (oneTimeKey != null) { |
| + System.out.println("oneTimeKey is set."); |
| + } |
| + |
| + serverCert = readParameter("serverCert", false); |
| + if (serverCert != null) { |
| + System.out.println("serverCert is set."); |
| + } |
| + |
| + forceProxy = false; |
| + proxyHost = null; |
| + proxyPort = null; |
| + str = readParameter("forceProxy", false); |
| + if (str != null) { |
| + if (str.equalsIgnoreCase("Yes")) { |
| + forceProxy = true; |
| + } else if (str.equalsIgnoreCase("No")) { |
| + forceProxy = false; |
| + } else { |
| + forceProxy = true; |
| + String[] pieces = str.split(" "); |
| + proxyHost = new String(pieces[0]); |
| + if (pieces.length >= 2) { |
| + proxyPort = new String(pieces[1]); |
| + } else { |
| + proxyPort = new String("8080"); |
| + } |
| + } |
| + } |
| + str = readParameter("proxyHost", false); |
| + if (str != null) { |
| + proxyHost = new String(str); |
| + } |
| + str = readParameter("proxyPort", false); |
| + if (str != null) { |
| + proxyPort = new String(str); |
| + } |
| + if (proxyHost != null && proxyPort == null) { |
| + proxyPort = new String("8080"); |
| + } |
| + |
| + ignoreProxy = false; |
| + str = readParameter("ignoreProxy", false); |
| + if (str != null && str.equalsIgnoreCase("Yes")) { |
| + ignoreProxy = true; |
| + } |
| + |
| + trustAllVncCerts = false; |
| + str = readParameter("trustAllVncCerts", false); |
| + if (str != null && str.equalsIgnoreCase("Yes")) { |
| + trustAllVncCerts = true; |
| + } |
| + trustUrlVncCert = false; |
| + str = readParameter("trustUrlVncCert", false); |
| + if (str != null && str.equalsIgnoreCase("Yes")) { |
| + trustUrlVncCert = true; |
| + } |
| + debugCerts = false; |
| + str = readParameter("debugCerts", false); |
| + if (str != null && str.equalsIgnoreCase("Yes")) { |
| + debugCerts = true; |
| + } |
| + debugKeyboard = false; |
| + str = readParameter("debugKeyboard", false); |
| + if (str != null && str.equalsIgnoreCase("Yes")) { |
| + debugKeyboard = true; |
| + } |
| + mapF5_to_atsign = false; |
| + str = readParameter("mapF5_to_atsign", false); |
| + if (str != null && str.equalsIgnoreCase("Yes")) { |
| + mapF5_to_atsign = true; |
| + } |
| + forbid_Ctrl_Alt = false; |
| + str = readParameter("forbid_Ctrl_Alt", false); |
| + if (str != null && str.equalsIgnoreCase("Yes")) { |
| + forbid_Ctrl_Alt = true; |
| + } |
| + ignoreMSLogonCheck = false; |
| + str = readParameter("ignoreMSLogonCheck", false); |
| + if (str != null && str.equalsIgnoreCase("Yes")) { |
| + ignoreMSLogonCheck = true; |
| + } |
| + ftpOnly = false; |
| + str = readParameter("ftpOnly", false); |
| + if (str != null && str.equalsIgnoreCase("Yes")) { |
| + ftpOnly = true; |
| + } |
| + graftFtp = false; |
| + str = readParameter("graftFtp", false); |
| + if (str != null && str.equalsIgnoreCase("Yes")) { |
| + graftFtp = true; |
| + } |
| + dsmActive = false; |
| + str = readParameter("dsmActive", false); |
| + if (str != null && str.equalsIgnoreCase("Yes")) { |
| + dsmActive = true; |
| + } |
| + delayAuthPanel = false; |
| + str = readParameter("delayAuthPanel", false); |
| + if (str != null && str.equalsIgnoreCase("Yes")) { |
| + delayAuthPanel = true; |
| + } |
| +// end runge/x11vnc |
| } |
| |
| public String readParameter(String name, boolean required) { |